InvoiceGen

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions); human review is required before treating this skill as clean.

This looks reasonable for a local invoicing helper. Before installing, be comfortable with it creating an invoices/ folder, storing client and payment details there, and running the included Python/Playwright PDF script. Use restrictive permissions, avoid committing invoice data to git, avoid raw bank/tax secrets unless needed, and review each invoice before sending it. ClawScan detected prompt-injection indicators (ignore-previous-instructions), so this skill requires review even though the model response was benign.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Invoice, client, payment, and tax details may remain in the workspace and could be exposed through backups, git commits, or other local users/processes.

Why it was flagged

The skill intentionally stores and reuses sensitive financial/business details in persistent local files. This is disclosed and purpose-aligned, but the data needs local protection.

Skill content
Business profiles contain payment details and tax IDs. Remind users: Store `business-profile.json` with restrictive permissions (`chmod 600`)
Recommendation

Store only the payment details needed on invoices, prefer payment links or references over raw bank/tax data, restrict file permissions, and keep invoices/ out of source control.

What this means

Using the skill means running a local PDF-rendering script and browser process in the workspace.

Why it was flagged

PDF generation runs included Python code and launches Chromium to render local HTML. This is central to the stated purpose and JavaScript is disabled, but it is still local code execution.

Skill content
with sync_playwright() as p:
        browser = p.chromium.launch()
        page.goto(f"file://{input_path}")
Recommendation

Review the included script before use, run it in a trusted workspace or virtual environment, and keep generated files scoped to invoices/.

What this means

Dependency versions and provenance are left to the user’s environment, so installs should come from trusted sources.

Why it was flagged

The skill depends on a manual, unpinned Playwright/Chromium install even though the registry requirements declare no required binaries or install spec.

Skill content
pip3 install playwright
playwright install chromium
Recommendation

Install Playwright from official package sources, consider using a virtual environment and pinned versions, and keep the browser dependency updated.

What this means

Malicious or accidental HTML in invoice fields could affect the generated PDF’s content or resources loaded during rendering.

Why it was flagged

Invoice fields may be inserted into HTML for PDF rendering. The package warns about this and disables JavaScript in the renderer, but user-provided markup should still be escaped or reviewed.

Skill content
ensure that any user-provided descriptions or client names do not contain malicious HTML tags, as they will be rendered in the final PDF document
Recommendation

Escape client-provided invoice fields before template substitution, keep JavaScript disabled, and avoid remote images or untrusted HTML in invoice data.

What this means

Users may over-trust the skill and store more sensitive financial data than necessary.

Why it was flagged

The package presents a security-verification badge, while the provided artifacts do not include an independent audit report. The code reviewed here mostly aligns with its privacy claims, but users should not rely on the badge alone.

Skill content
![Codex Security Verified](https://img.shields.io/badge/Codex-Security_Verified-brightgreen)
Recommendation

Treat security badges and guarantees as claims unless independently verified, and continue following local data-protection practices.