Diy Pc Ingest

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill is not obviously malicious, but it should be reviewed because it can change Notion data and the preview-versus-write instructions are unclear.

Before installing, use a dedicated minimal-scope Notion integration, verify the notion-api-automation dependency, and do not run the apply script until the skill clearly shows a preview-only command versus an explicit confirmed write command.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

The agent or user could accidentally create or update Notion rows during what was expected to be only a preview.

Why it was flagged

The same mutation-capable script is instructed for both the no-write preview step and the write/upsert step, without a clearly documented flag or command boundary in the provided instructions.

Skill content
5) **Search existing records in Notion** using `scripts/notion_apply_records.js` ... **Do not write anything** ... 7) **Upsert into Notion** using `scripts/notion_apply_records.js`
Recommendation

Make dry-run behavior explicit and default, require an explicit apply/confirm flag for writes, and document separate preview and write commands.

What this means

A mistaken JSONL record could overwrite fields or archive a Notion page accessible to the integration.

Why it was flagged

The skill discloses direct update, archive, and overwrite controls. They are useful for cleanup but can clear fields or archive pages if used incorrectly.

Skill content
`page_id` (or `id`): update this Notion page directly (bypasses upsert matching); `archive: true`: archive the page ... `overwrite: true`: allow overwriting existing values (including clearing with null)
Recommendation

Use these controls only after an explicit user request, validate that the page belongs to the intended DIY_PC target, and require extra confirmation for archive or overwrite operations.

What this means

If the token has access beyond the DIY_PC tables, mistakes or overbroad commands could affect more Notion data than intended.

Why it was flagged

The Notion token is expected for this integration, but its scope determines how much Notion data the skill can read or modify.

Skill content
Provide Notion auth ... env: `NOTION_API_KEY` ... Use minimal-scope Notion integration permissions (only target DIY_PC data sources).
Recommendation

Use a dedicated Notion integration shared only with the target DIY_PC databases, and do not store the token in published files.

What this means

The installed dependency can make Notion API requests using the user's token; a wrong or compromised dependency would increase risk.

Why it was flagged

The runtime executes a helper from a separate dependency skill. This dependency is disclosed, but it is outside the provided artifact contents and receives the Notion credential environment.

Skill content
const NOTIONCTL_PATH = path.resolve(__dirname, '..', '..', 'notion-api-automation', 'scripts', 'notionctl.mjs'); ... execFileSync('node', args, { encoding: 'utf-8', env }).trim();
Recommendation

Install notion-api-automation from a trusted source, review or pin its version if possible, and keep the Notion token narrowly scoped.

What this means

Some receipt or product text could be sent to external search/fetch providers if enrichment is used.

Why it was flagged

The skill discloses optional external enrichment. Pasted receipts or specs may contain product, price, serial, or order-context details.

Skill content
External enrichment (optional): `web_search`/`web_fetch` may send partial product text to external web providers.
Recommendation

Skip web enrichment for sensitive receipts, or remove order IDs, serial numbers, and personal details before allowing search/fetch.