Agent-manager-for-AI-planner

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly coherent for an AI orchestration service, but its run telemetry/read access controls appear weaker than documented and should be reviewed before shared use.

Before installing or deploying, review the read-access authentication behavior, require and validate run tokens, restrict outbound and callback allowlists, keep tool registration disabled unless needed, and enable telemetry redaction for sensitive or shared use.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

In a shared deployment, someone with any arbitrary token may be able to access run telemetry or reports if these read routes use this helper.

Why it was flagged

The read-token helper appears to treat any non-empty X-Run-Token as sufficient, rather than checking it against RUN_TOKENS as parseTokenOwner does. This matters because the skill documents read endpoints for runs, events, streams, replay, reports, and run listing.

Skill content
if (tokenRequired()) return token ? { ok: true } : { ok: false }; ... return token ? { ok: true } : { ok: false };
Recommendation

Validate read tokens against the configured RUN_TOKENS list and enforce run ownership for all run/event/replay/report/list endpoints.

What this means

If tool registration or callback allowlists are configured too broadly, plans could invoke external services or send task data outside the service.

Why it was flagged

The service can register and invoke HTTP callback tools, which is expected for an orchestration kernel but gives external plans a path to trigger tool calls when enabled.

Skill content
POST /v1/tools/register (only when enabled) ... Callback tools use `callback_url` and enforce `ToolSpec.timeout_ms`.
Recommendation

Keep tool registration disabled unless needed, use strict TOOL_CALLBACK_ALLOWLIST values, and review allowed tools before running third-party plans.

What this means

Task content may leave the service and be sent to configured providers or callback endpoints.

Why it was flagged

The artifact clearly discloses outbound communication with gateways and callback tools, including possible transmission of task and dependency data.

Skill content
When gateway or callback tools are enabled, task inputs, dependency payloads, and tool payloads may be sent outbound to allowed destinations.
Recommendation

Use minimal allowlists, avoid sending sensitive data unless necessary, and enable telemetry redaction in shared deployments.

What this means

Run history, task inputs, and tool results may be retained or exposed through telemetry endpoints.

Why it was flagged

Replayable telemetry and event history are central to the service, but they may preserve sensitive run context unless redaction is enabled.

Skill content
GET /v1/run/:id/replay returns stable replay JSON ... Enable `REDACT_TELEMETRY=1` with mode `hash` or `truncate` to redact sensitive event and replay fields
Recommendation

Enable REDACT_TELEMETRY for shared or sensitive use, set appropriate retention limits, and restrict access to replay/report endpoints.

What this means

Provider keys or run tokens configured for the service grant access to external AI providers and service runs.

Why it was flagged

The service can use provider credentials and run tokens from environment variables. This is expected for LLM-provider integration and optional access control, with no supplied evidence of hardcoded or leaked secrets.

Skill content
GATEWAY_API_KEY: z.string().default(''), OPENAI_API_KEY: z.string().default(''), ANTHROPIC_API_KEY: z.string().default(''), ... RUN_TOKENS: z.string().default('')
Recommendation

Use least-privilege provider keys, rotate secrets regularly, and avoid placing broad production credentials in a shared deployment.

What this means

Users have less external context for who maintains the service and where updates come from.

Why it was flagged

The artifact set includes source files and a package lock, but the registry metadata does not provide an upstream source or homepage for provenance verification.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Prefer installing from a verifiable repository or review the included source and lockfile before deployment.