GitHub Stars Export

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill largely matches its stated GitHub-to-Notion purpose, but its Notion sync handles your Notion token unsafely and can archive existing Notion database entries without a clear confirmation step.

Only use this skill if you are comfortable granting it Notion write access and authenticated GitHub CLI access. Before running it, remove verify=False from the Python script, explicitly pass your intended Notion parent page ID, back up or inspect any existing Notion database referenced in assets/.notion_sync_config.json, and consider running the export step separately before syncing.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Someone on the network path could potentially impersonate Notion and capture your Notion token or the repository data being synced.

Why it was flagged

The script places the Notion API key in an Authorization header while disabling certificate verification for Notion API requests, increasing the risk that the token and synced data could be intercepted.

Skill content
NOTION_TOKEN = os.environ.get("NOTION_API_KEY") ... urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) ... requests.post(url, headers=HEADERS, json=payload, verify=False)
Recommendation

Remove all verify=False usage, stop suppressing TLS warnings, require a valid NOTION_API_KEY, and document the minimum Notion integration permissions needed.

What this means

If the saved database ID is wrong or the agent runs the sync unintentionally, existing Notion database entries could be archived and disappear from normal views.

Why it was flagged

On repeat runs, the script archives every page returned from the configured Notion database before inserting fresh rows, with no confirmation prompt or schema/ownership check.

Skill content
if db_id:
        print(f"Found existing database ID in config for '{args.db_name}': {db_id}")
        clear_database(db_id) ... requests.patch(patch_url, headers=HEADERS, json={"archived": True}, verify=False)
Recommendation

Add an explicit confirmation or dry-run mode before archiving, verify the database schema and creator marker, and only archive pages previously created by this skill.

What this means

The sync may try to create a database under an unintended Notion page unless you override the parent ID.

Why it was flagged

New database creation defaults to a fixed Notion parent page ID that is not explained in SKILL.md, so the destination of writes is not clearly user-selected.

Skill content
DEFAULT_PARENT_PAGE_ID = "f94aa417-3269-4fa6-a869-dc5b22eb1cca"
...
parser.add_argument("--parent-id", default=DEFAULT_PARENT_PAGE_ID, help="ID of the parent Notion page.")
Recommendation

Require the user to provide --parent-id explicitly, document how to choose it, and avoid hardcoded workspace/page identifiers.

What this means

You may not realize before install that this skill depends on authenticated gh access, jq, requests, and a Notion API key.

Why it was flagged

The registry metadata does not surface the runtime dependencies and credential need that the included SKILL.md and agent.yaml describe.

Skill content
Required binaries (all must exist): none ... Required env vars: none ... Primary credential: none ... Install specifications: No install spec
Recommendation

Update registry metadata to declare gh, jq, the Python requests dependency, and NOTION_API_KEY.

What this means

The documentation may give users a misleading impression of how safely credentials are handled.

Why it was flagged

The documentation makes an unsupported credential-handling claim and calls the token handling secure, while the actual script disables TLS verification for API calls.

Skill content
The script will securely read your integration token from your environment variables ... (Note: A default fallback key is hardcoded within the script if the environment variable is not set).
Recommendation

Correct the documentation, remove the false fallback-key statement, and avoid describing credential handling as secure until TLS verification is restored.