Salesforce Commerce

PassAudited by ClawScan on May 13, 2026.

Overview

This appears to be a Salesforce Commerce development guidance skill with purpose-aligned documentation fetching and safety-check scripts, with no artifact-backed evidence of hidden credential theft, persistence, or destructive behavior.

This skill looks safe to install as developer guidance. Expect it to encourage web lookups of official Salesforce documentation, and be cautious before allowing any agent-run Salesforce CLI command, especially deploys, org logins, code activations, deletes, or production-targeted actions. Verify separately whether the bundled safety hook scripts are actually enabled in your OpenClaw environment.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may browse external official documentation before helping with Salesforce Commerce code.

Why it was flagged

The skill directs the agent to use web tools before writing implementation code. This is purpose-aligned for current Salesforce Commerce APIs, but it is still autonomous tool-use guidance the user should understand.

Skill content
Before writing any Salesforce Commerce implementation code, you MUST web-search and/or web-fetch the relevant official documentation.
Recommendation

Allow this when current documentation is needed, and avoid sending proprietary code or secrets to external pages unless explicitly intended.

What this means

If the agent is allowed to run shell commands, Salesforce CLI actions could affect real orgs or storefronts.

Why it was flagged

The script explicitly handles high-impact Salesforce CLI and API operations. Its behavior is protective, but it shows the skill is meant to operate in contexts where deploy, activation, deletion, or production-impacting commands may arise.

Skill content
DESTRUCTIVE_PATTERNS = [(r'sfcc-ci\s+code:activate\s+.*(production|prod-|prd-)', "Activate code on production — can break live storefront"), ... (r'sf\s+org\s+delete|sfdx\s+force:org:delete', "Org deletion — permanent data loss")]
Recommendation

Require explicit user confirmation for deploys, activations, deletes, and production-targeted Salesforce commands.

What this means

Connecting the agent environment to a Salesforce org can give tools access to org data and deployment permissions depending on the account used.

Why it was flagged

Salesforce org authentication is expected for Salesforce development workflows, and the artifact warns about it rather than capturing credentials. Users should still treat org login as account delegation.

Skill content
(r'sf\s+org\s+login', "Org login — will authenticate to a Salesforce org")
Recommendation

Use least-privilege sandbox credentials when possible and confirm which org is targeted before any authenticated command.

What this means

Users may not actually receive the protective command and secret-check behavior unless the host separately configures those scripts.

Why it was flagged

The bundle includes helper scripts, but the provided install information says the skill is instruction-only. This means the safety scripts may be present in the package without being automatically installed or enforced.

Skill content
No install spec — this is an instruction-only skill.
Recommendation

If relying on the safety hooks, verify in the OpenClaw host configuration that the bundled scripts are registered and active.