Samvida
Analysis
Samvida mostly matches its stated purpose, but it asks the agent to run shell commands with unquoted user-provided URLs and can optionally make persistent live-site changes using powerful deployment tokens.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Run the crawler: ... crawl.py \
{url} > /tmp/llms_business_info.json ... crawl.py \
{url} {extra_url1} {extra_url2} > /tmp/llms_business_info.jsonThe URL and extra URLs come from the user, but the workflow places them directly into a shell command without quoting or strict validation.
Create venv with: python3 -m venv ~/.virtualenvs/samvida && ~/.virtualenvs/samvida/bin/pip install httpx
The package expects local Python setup and package installation even though the registry install spec says there is no install mechanism; the dependency setup is not pinned.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
give it permission to: `Workers Scripts: Edit`, `Workers Routes: Edit` ... Creates or updates a 301 redirect ... Publishes the site
The optional deploy path requires provider credentials that can modify live Cloudflare Workers/routes or Webflow redirects and publishing state.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Crawled pages may contain publicly available contact details (emails, names). These are included in the llms.txt output and sent to your configured OpenClaw LLM provider for generation.
The skill intentionally reuses crawled website content and contact details as LLM context and as material for a public llms.txt file.
