Todolist Md Clawdbot Copy

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its todo-file purpose, but it uses persistent, broad Google Drive credentials and undeclared local Drive tooling that users should review carefully before installing.

Review this skill before installing. It appears intended for Google Drive Markdown todo files, not hidden exfiltration, but authorizing it may create persistent full-Drive access. Use a dedicated Drive folder/account, verify the gog binary and credential files, and revoke/delete stored OAuth tokens when no longer needed.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If authorized, the skill may receive authority over more Google Drive content than just the intended todo Markdown files.

Why it was flagged

The helper requests the broad Google Drive OAuth scope rather than a narrower file/folder-scoped permission, while the stated purpose is editing Markdown todo files.

Skill content
const scopes = ['https://www.googleapis.com/auth/drive'];
Recommendation

Use the narrowest possible Drive scope, prefer a dedicated folder/account, and clearly disclose the required Google credential and exact access level before installation.

What this means

A stored refresh token can keep granting Drive access after the first run unless the user revokes it or deletes the secret file.

Why it was flagged

The script persists a Google OAuth refresh token locally for reuse, creating ongoing account access that is not declared in the registry credential requirements.

Skill content
const refreshTokenFile = args.refreshTokenFile || process.env.REFRESH_TOKEN_FILE || '/root/clawd/.secrets/todolist_drive_oauth.json';
Recommendation

Tell users where tokens are stored, how to revoke them, and avoid persistent full-Drive tokens unless strictly necessary.

What this means

Local Google/gog credentials may be exposed to the helper process environment/arguments and are not obvious from the registry requirements.

Why it was flagged

The Drive folder helper reads gog credentials and passes the keyring password through the command invocation, which is sensitive local credential handling.

Skill content
`GOG_KEYRING_PASSWORD=${pw}`,
Recommendation

Avoid passing secrets on command lines where possible, use safer credential stores, and declare the required gog account/keyring credentials.

What this means

The skill depends on local command execution and the behavior of an external gog binary.

Why it was flagged

The script executes a local gog command via sudo to list Drive files; this is aligned with the Drive workflow but is a real local execution capability.

Skill content
const raw = execFileSync(cmd[0], cmd.slice(1), { encoding: 'utf8' });
Recommendation

Install only if you trust the local gog setup, and confirm the binary path and account used before running folder-wide actions.

What this means

Users may not realize an undeclared local Drive CLI dependency will be used.

Why it was flagged

The script relies on an external gog binary even though the registry requirements list no required binaries.

Skill content
const gogBin = process.env.GOG_BIN || '/home/linuxbrew/.linuxbrew/bin/gog';
Recommendation

Declare gog as a required dependency and document its expected version, path, and authentication requirements.

What this means

Choosing a large Drive folder could cause the agent to scan or update multiple todo files, not just one.

Why it was flagged

The intended folder runner can operate across multiple Markdown files in a Drive folder, so an overly broad root folder could affect more files than expected.

Skill content
lists all `.md` under a folder, detects changes via state file, downloads only changed files, and writes back
Recommendation

Use a narrowly scoped Drive folder and review include/exclude or per-file opt-in settings before allowing write-back.

What this means

Todo text may be shared with the agent runtime/LLM for review.

Why it was flagged

The workflow may send extracted open-task content from Drive Markdown files to an LLM, although the instructions try to minimize the amount sent.

Skill content
(Optional) call the LLM on the extracted subset, not the full document
Recommendation

Do not use this on todo files containing secrets or highly sensitive personal/business information unless the LLM data handling is acceptable.