P2claw

PassAudited by ClawScan on May 8, 2026.

Overview

P2claw does what it claims—installs a local reverse-proxy tool and publishes selected localhost apps to public links—but users should be careful because that can expose local apps and their privileges to the internet.

Install only if you trust the p2claw release source and understand that exposing a port creates a public URL. Confirm every exposed app and port, avoid sharing debug or credentialed services, and stop routes or the background service when done.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone with or able to discover the link can reach the local app being exposed, including any debug, file, shell, or admin features that app provides.

Why it was flagged

The core command intentionally exposes a selected localhost service to internet-reachable users. The artifact discloses this and requires confirmation, so it is purpose-aligned but high-impact.

Skill content
A p2claw URL is **a public URL**... There is no IP allowlist, no auth in front of it
Recommendation

Confirm the exact app and port before exposing it, avoid debug or unauthenticated services, and stop or remove the route when sharing is finished.

What this means

A remote visitor could potentially trigger database, cloud, or API actions through the exposed app if the app has those credentials available.

Why it was flagged

The skill itself does not show credential harvesting, but publishing a local app can delegate that app's existing credentials or account privileges to remote visitors.

Skill content
The app talks to a database, API key, cloud account, or any credential pulled from the user's environment. Exposing the app exposes whatever it can do with those creds.
Recommendation

Do not expose credentialed or private apps unless authentication and authorization are verified; use an authenticated tunnel for private sharing.

What this means

Installing runs a downloaded executable that was not included in the reviewed artifacts, so compromise or replacement of the release source could affect the user's machine.

Why it was flagged

The installer fetches the latest release binary from GitHub by default, and checksum verification is best-effort rather than mandatory. This is normal for a binary installer but leaves provenance dependent on the GitHub release source.

Skill content
curl -fsSL "https://api.github.com/repos/$REPO/releases/latest" ... warn "SHA256SUMS not published or no sha256 tool available; skipping integrity check"
Recommendation

Use the default repository only if trusted, pin a known version with P2CLAW_VERSION or --version, and prefer releases with published checksums or signatures.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

If installed as a service, p2claw may keep running in the background and maintain configured sharing behavior until stopped or removed.

Why it was flagged

The tool can be installed as a persistent user-level daemon. This is disclosed and aligned with maintaining proxy routes, but it can continue running beyond a single sharing session.

Skill content
$BIN_NAME service install              # always-on user-scope service (no sudo)
Recommendation

Use foreground mode for one-off sharing, review active routes with the p2claw CLI, and stop or uninstall the service when it is no longer needed.