Craft CLI

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: craft-cli Version: 1.6.2 The skill is classified as suspicious due to its installation method, which involves downloading an executable binary from a remote GitHub URL (`https://github.com/nerveband/craft-cli/releases/download/v1.0.0/craft-darwin-arm64`) using `curl` and then moving it to `/usr/local/bin` with `sudo mv`. While this is a common installation pattern for CLI tools, it represents a significant supply chain risk and requires elevated privileges, making it a high-risk capability without clear evidence of malicious intent within the provided skill instructions. The `craft-helper.sh` script also includes a pass-through mechanism (`"$CRAFT" "$@"`) that allows arbitrary commands to be executed by the installed `craft` binary.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill may gain access to specific Craft spaces without the user supplying or approving credentials at install time.

Why it was flagged

The helper hardcodes API endpoints for named business and personal spaces. SKILL.md treats the API URL as the configured access mechanism, while the registry declares no credential requirement.

Skill content
WAVEDEPTH_API="https://connect.craft.do/links/5VruASgpXo0/api/v1"
PERSONAL_API="https://connect.craft.do/links/HHRuPxZZTJ6/api/v1"
Recommendation

Remove hardcoded Craft API URLs, revoke or rotate any exposed links, require users to provide their own scoped credentials/configuration, and declare those credentials in metadata.

What this means

A mistaken or over-eager agent action could alter or delete business or personal Craft documents.

Why it was flagged

The skill exposes direct document mutation and deletion commands against the configured Craft space, but does not document user-confirmation, scoping, backup, or reversibility safeguards.

Skill content
### Update Document
~/clawd/skills/craft-cli/craft update <document-id> --file updated-content.md
...
### Delete Document
~/clawd/skills/craft-cli/craft delete <document-id>
Recommendation

Require explicit user confirmation before create/update/delete operations, show the active Craft space and document ID/title before acting, and prefer read-only defaults unless the user specifically requests mutation.

What this means

The unreviewed downloaded binary would handle the Craft API access and document operations, increasing supply-chain risk.

Why it was flagged

The installation instructions download an external executable and install it into a privileged system path, but the reviewed artifacts do not include the binary, checksum, signature, or install spec.

Skill content
curl -L https://github.com/nerveband/craft-cli/releases/download/v1.0.0/craft-darwin-arm64 -o craft
chmod +x craft
sudo mv craft /usr/local/bin/
Recommendation

Provide a pinned and verified install spec, include checksums or signatures, align versions and paths, declare the required binary, and avoid privileged installation where possible.