GeeLark Complete

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent GeeLark automation runbook, but it needs review because it can use local credentials, unreviewed helper scripts, API/UI automation, and persistent memory for account/profile operations.

Review the referenced helper scripts before running the skill, use a least-privilege GeeLark token, confirm the exact workspace/profile/endpoints before any write or UI action, and prevent tokens, session IDs, or private profile mappings from being saved into persistent memory.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

66/66 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mis-scoped instruction or mistaken automation step could change GeeLark/profile/account state through API or UI actions.

Why it was flagged

The skill directs the agent to probe/request API endpoints, proceed toward write calls, and switch to UI automation when blocked. Although it includes verification and some limits, the allowed endpoints, profiles, and non-posting mutations are not tightly scoped.

Skill content
Endpunkt-Footprint (`probe`, `request`)
- Lesende Ersttests vor schreibenden Calls
...
4. Bei API-Blocker auf UI-Fallback wechseln.
Recommendation

Require explicit user approval before any write, upload, profile, sync, or posting-related action; define allowed endpoints and target profiles; prefer dry-runs and reversible actions.

What this means

Installing the skill could lead the agent to execute local helper code whose provenance and safety were not reviewed in this artifact set.

Why it was flagged

Core operations depend on helper scripts that are not included or pinned in the reviewed skill package, so their behavior cannot be assessed here while they would run with local API/sync authority.

Skill content
SKILL.md references `scripts/geelark/local_client.py` and `scripts/geelark/sync_client.mjs`; the file manifest lists only `SKILL.md`.
Recommendation

Inspect and pin the helper scripts before use, include them in the reviewed package or document their trusted source, and avoid running them with production credentials until verified.

What this means

Actions may be performed with the user's GeeLark authority, so mistakes could affect real profiles, assets, or workspace data.

Why it was flagged

The skill expects a GeeLark bearer token and signed native-app authentication. This is purpose-aligned for GeeLark automation, but it grants delegated account/workspace authority and is not declared in registry credential metadata.

Skill content
`GEELARK_API_KEY=<bearer token>` ... `Signierte Requests mit `app-id` + `app-auth``
Recommendation

Use least-privilege tokens, keep the `.env` file private, verify the target workspace/profile before actions, and rotate credentials if helper script behavior is uncertain.

What this means

Profile identifiers, proxy/phone mappings, session details, or troubleshooting outputs could be stored and reused in later tasks beyond the user's immediate intent.

Why it was flagged

The skill instructs the agent to persist operational details and every reproducible finding, but it does not define what must be redacted, how long data is retained, or when the user must approve saving it.

Skill content
`phone_id` Mapping aus Dashboard/Baserow festhalten ... Jede reproduzierbare Erkenntnis in Memory/Skill-Doku hinterlegen
Recommendation

Ask before saving operational details, redact tokens/session IDs/private identifiers, scope memory to the current project, and add retention or cleanup guidance.