Quickbooks-Agent

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is coherent for QuickBooks management, but it would let an agent run unreviewed external code with broad authority to change financial records.

Treat this as a high-impact financial automation tool. Before installing, inspect and pin the GitHub code, use a QuickBooks sandbox first, keep credentials and tokens secure, and require explicit approval before any action that creates, changes, deletes, sends, voids, or applies financial records.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The code that receives QuickBooks credentials and can modify accounting records would come from an external repository state that was not reviewed in these artifacts.

Why it was flagged

The runnable code is fetched from GitHub at install time and built locally, but the provided review artifacts contain no code files and do not pin a commit, tag, or image digest.

Skill content
git clone https://github.com/claw4business/quickbooks-online-cli.git ~/skills/qb-cli; docker compose -f ~/skills/qb-cli/docker-compose.yml build
Recommendation

Review and pin a specific trusted commit or release before installing, and test in a QuickBooks sandbox before providing production credentials.

What this means

If authorized against a real company account, the agent may be able to read and change sensitive financial records through the QuickBooks API.

Why it was flagged

The skill requires QuickBooks app credentials and OAuth authorization to access the user's QuickBooks company environment.

Skill content
requires: env: - QB_CLIENT_ID - QB_CLIENT_SECRET - QB_ENVIRONMENT ... auth login --callback-url
Recommendation

Use least-privilege QuickBooks access where possible, start with sandbox mode, protect the client secret and OAuth tokens, and only authorize production access after reviewing the code.

What this means

A mistaken command could create, modify, send, void, or otherwise affect important QuickBooks records such as invoices, payments, bills, accounts, transfers, or journal entries.

Why it was flagged

The CLI exposes many high-impact accounting operations in an agent-consumable form. The artifact includes some safety rules, but the documented authority is broad enough that accidental or premature tool use could affect business books.

Skill content
Manage customers, invoices, payments, bills, vendors, accounts, items, expenses, journal entries, deposits, transfers, estimates, purchase orders, and run financial reports directly via the Intuit API. 164 commands across 29 command groups. All commands return JSON by default for agent consumption.
Recommendation

Require explicit user confirmation for every create, update, delete, void, send, payment, transfer, journal-entry, and production-report action, and keep backups/audit trails.