Clawhub Github Publish BkCCGK

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Prompt-injection indicators were detected in the submitted artifacts (system-prompt-override); human review is required before treating this skill as clean.

Before installing, make sure you are comfortable running the npm package, providing a Mistral API key, and sending selected project data or media to Mistral. In sensitive environments, pin the npm version, keep tool approvals on for delete/batch/workflow actions, and use a revocable key with usage monitoring. ClawScan detected prompt-injection indicators (system-prompt-override), so this skill requires review even though the model response was benign.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

66/66 vendors flagged this plugin as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

Enabling the plugin may execute code fetched from npm, including future compatible patch versions.

Why it was flagged

The plugin can auto-run the MCP server package from npm with confirmation suppressed and a version range. This is disclosed and central to the integration, but it creates a normal npm supply-chain trust dependency.

Skill content
"command": "npx", "args": ["-y", "mistral-mcp@^0.6.0"]
Recommendation

Install only from a trusted source, and consider pinning an exact package version before using it in sensitive workspaces.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

The agent can use the configured Mistral account for API calls, which may expose submitted content to Mistral and incur costs.

Why it was flagged

The OpenClaw skill requires a Mistral API key. That is expected for a Mistral integration, but it grants access to the user's Mistral account and usage billing.

Skill content
requires:\n      env:\n        - MISTRAL_API_KEY\n...\n    primaryEnv: MISTRAL_API_KEY
Recommendation

Use normal secret storage or environment variables, avoid pasting keys into chat, and monitor or revoke the key if needed.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

If invoked, the agent could delete Mistral-hosted files, cancel jobs, or start/interact with workflows tied to the user's account.

Why it was flagged

The tool surface includes provider-side deletion, batch cancellation, and workflow execution/interactions. These are disclosed and aligned with the Mistral MCP purpose, but they can mutate state in the user's Mistral account.

Skill content
- `files_delete`\n- `batch_cancel`\n...\n- `workflow_execute`\n- `workflow_status`\n- `workflow_interact` — polymorphic: `signal` or `query` against a running execution
Recommendation

Keep tool approval enabled for destructive or costly actions, verify target file/job/workflow identifiers, and use the narrower profile unless the full surface is needed.

#
ASI07: Insecure Inter-Agent Communication
Medium
What this means

Private or proprietary code changes could be transmitted to Mistral during code review workflows.

Why it was flagged

When this skill is invoked, local code diffs may be read and sent through the Mistral MCP server for model review. This is disclosed and purpose-aligned, but source code can be sensitive.

Skill content
Auto-fetches the diff via git diff if no argument is provided... Call the MCP prompt `codestral_review`... Pass the resulting messages to `mistral_chat`
Recommendation

Use these skills only for code you are allowed to share with Mistral, or provide a redacted/manual diff instead of relying on auto-fetch.