Craft CLI

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This Craft integration is purpose-aligned, but it embeds credential-like Craft API links for named personal and business spaces and can modify or delete their documents through an unverified CLI.

Do not install this as-is unless you own the referenced Craft spaces and are comfortable with the embedded API links. Rotate those links if they are real, replace them with your own scoped configuration, verify the Craft CLI binary before installing it, and require confirmation before any update or delete action.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill may gain access to specific Craft spaces without the user supplying or approving credentials at install time.

Why it was flagged

The helper hardcodes API endpoints for named business and personal spaces. SKILL.md treats the API URL as the configured access mechanism, while the registry declares no credential requirement.

Skill content
WAVEDEPTH_API="https://connect.craft.do/links/5VruASgpXo0/api/v1"
PERSONAL_API="https://connect.craft.do/links/HHRuPxZZTJ6/api/v1"
Recommendation

Remove hardcoded Craft API URLs, revoke or rotate any exposed links, require users to provide their own scoped credentials/configuration, and declare those credentials in metadata.

What this means

A mistaken or over-eager agent action could alter or delete business or personal Craft documents.

Why it was flagged

The skill exposes direct document mutation and deletion commands against the configured Craft space, but does not document user-confirmation, scoping, backup, or reversibility safeguards.

Skill content
### Update Document
~/clawd/skills/craft-cli/craft update <document-id> --file updated-content.md
...
### Delete Document
~/clawd/skills/craft-cli/craft delete <document-id>
Recommendation

Require explicit user confirmation before create/update/delete operations, show the active Craft space and document ID/title before acting, and prefer read-only defaults unless the user specifically requests mutation.

What this means

The unreviewed downloaded binary would handle the Craft API access and document operations, increasing supply-chain risk.

Why it was flagged

The installation instructions download an external executable and install it into a privileged system path, but the reviewed artifacts do not include the binary, checksum, signature, or install spec.

Skill content
curl -L https://github.com/nerveband/craft-cli/releases/download/v1.0.0/craft-darwin-arm64 -o craft
chmod +x craft
sudo mv craft /usr/local/bin/
Recommendation

Provide a pinned and verified install spec, include checksums or signatures, align versions and paths, declare the required binary, and avoid privileged installation where possible.