Back to skill
v1.0.0

My Liang Tavily Search

BenignClawScan verdict for this skill. Analyzed May 1, 2026, 7:14 AM.

Analysis

The skill matches its stated Tavily web-search purpose, with expected API key use and third-party query sharing, but its package metadata should be verified.

GuidanceInstall only if you are comfortable with Tavily receiving your search queries and using your TAVILY_API_KEY. Keep the key scoped and private, and verify the publisher/version mismatch before enabling the skill.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Agentic Supply Chain Vulnerabilities
SeverityInfoConfidenceMediumStatusNote
_meta.json
"ownerId": "kn724ben7jjrcy3pebw2jbak3s8201cp", "slug": "my-liang-tavily-search", "version": "1.0.1"

The supplied registry metadata lists a different owner ID and version, so the package identity metadata is inconsistent even though the runtime code is coherent.

User impactThe mismatch may make it harder to confirm the publisher and exact version being installed.
RecommendationVerify the skill source, publisher, and version before installing, especially before adding an API key.
Permission boundary

Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.

Identity and Privilege Abuse
SeverityLowConfidenceHighStatusNote
scripts/search.mjs
const apiKey = (process.env.TAVILY_API_KEY ?? "").trim(); ... "Authorization": `Bearer ${apiKey}`

The script requires a Tavily API key and sends it to Tavily as a bearer token; this is expected for the stated service, but it is still credential use.

User impactThe skill can use the user's Tavily account quota and authorization for searches.
RecommendationUse a Tavily key intended for this purpose, keep it private, and rotate it if it may have been exposed.
Sensitive data protection

Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.

Insecure Inter-Agent Communication
SeverityLowConfidenceHighStatusNote
scripts/search.mjs
const body = { query: query, ... }; ... await fetch("https://api.tavily.com/search", { method: "POST", ... body: JSON.stringify(body) })

Search queries and options are sent to the external Tavily API; this is disclosed and purpose-aligned, but creates a third-party data boundary.

User impactQueries may be visible to Tavily, so sensitive or confidential search terms should be treated carefully.
RecommendationAvoid sending secrets, private documents, or confidential business details as search queries unless Tavily use is acceptable.