ad2
Analysis
This ads-management skill is not clearly malicious, but it pushes the agent to use ad/account tools, stored API tokens, approval actions, and persistent memory automatically with little confirmation or scoping.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
ALWAYS load this skill for any ads-related task... mandatory tool execution order and enforces zero-question policy... call the tool IMMEDIATELY... No preamble. No questions.
This instruction forces immediate tool use across broad ads-related triggers and suppresses normal clarification or consent checks.
`/pheduyet <id>` | `ads_manager_execute_action(proposalId:"<id>", status:"approved")` ... `http_request` → params: `{ url, method?, headers?, body? }` ... `Call them without hesitation.`The skill encourages immediate execution of approval actions and also exposes a generic HTTP request capability without stated method, domain, or approval limits.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
The system reads `APIFY_TOKEN` automatically... The same applies to: `SERPER_API_KEY`... `META_ACCESS_TOKEN`... These tools handle auth internally. **Zero user input required.**
The skill relies on stored provider/account credentials, but the supplied metadata declares no required environment variables, credential, or scope boundaries.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Step 3: ads_manager_save_competitor(name, angle, note, sourceUrl) → ALWAYS save findings to memory
The skill explicitly persists competitor-research results for later use, which is purpose-aligned but lacks retention, review, or trust-boundary guidance.
