Graincrawl

ReviewAudited by ClawScan on May 17, 2026.

Overview

Graincrawl is a coherent Granola archive helper, but it installs an external CLI and can search or sync sensitive local notes and transcripts.

Install Graincrawl only if you want your agent to access local Granola notes, transcripts, panels, and freshness data. Be cautious with private API syncs, Keychain prompts, and SQL queries, and prefer a pinned or reviewed CLI version if supply-chain assurance matters.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The installed binary may change over time when @latest resolves to a newer version.

Why it was flagged

Installation pulls the latest version of an external Go module, while the reviewed artifacts do not include the CLI source code.

Skill content
kind: go | module: github.com/openclaw/graincrawl/cmd/graincrawl@latest | creates binaries: graincrawl
Recommendation

Install only from the expected repository, and prefer a pinned or reviewed version if you need stronger supply-chain assurance.

What this means

Sensitive Granola content may be brought into the agent conversation or outputs when you ask the skill to search or retrieve it.

Why it was flagged

The skill is designed to retrieve local Granola notes, transcripts, and panels, which can contain private user or meeting information.

Skill content
Use local Granola archive data first... graincrawl search "query" ... graincrawl notes --json ... graincrawl transcripts get <id> ... graincrawl panels get <id>
Recommendation

Use it only in workspaces where the agent is allowed to see the relevant Granola notes and transcripts, and review outputs before sharing them.

What this means

Syncing or debugging encrypted sources could require access to your Granola account data or local credential prompts.

Why it was flagged

The documented workflow may involve a private Granola API and Keychain/secrets checks, which can touch account or credential boundaries.

Skill content
graincrawl sync --source private-api ... Before encrypted source debugging, run explicit unlock/secrets checks; do not surprise-prompt Keychain.
Recommendation

Approve private API syncs and Keychain prompts only when expected, and avoid encrypted-source debugging unless you understand what is being accessed.

What this means

SQL queries could reveal more archive information than a simple search if used broadly.

Why it was flagged

The skill exposes a SQL query path into the archive, but the instructions explicitly limit it to read-only counts and rankings.

Skill content
graincrawl --json sql "select count(*) as notes from notes;" ... Use read-only SQL for exact counts/rankings.
Recommendation

Keep SQL use limited to read-only, narrowly scoped questions such as counts, rankings, and date ranges.