Executive Briefing

AdvisoryAudited by Static analysis on May 1, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

A bad or manipulated client ID could make the skill write briefing_summary.md, revenue_xray.json, and briefing_data.json into an unexpected local directory.

Why it was flagged

The required client ID is used directly in the output path. Because it is not normalized or checked for path separators/absolute paths, a malformed client ID could cause report files to be created outside the intended Xzenia data directory.

Skill content
p.add_argument('--client', required=True) ... report_dir=os.path.join(DATA_DIR,'clients',client_id,'reports'); os.makedirs(report_dir, exist_ok=True)
Recommendation

Reject client IDs containing path separators or absolute paths, canonicalize the final report path, verify it stays under the intended data directory, and disclose or implement the --output option clearly.

What this means

Generated reports may contain client details, leakage findings, and recovery actions from the local Xzenia workspace.

Why it was flagged

The helper script reads persistent local client, financial event, finding, and action data, then writes detailed report JSON files. This is aligned with revenue briefing generation but is sensitive business context that may be reused or exposed through generated artifacts.

Skill content
DB_PATH=os.path.expanduser('~/.openclaw/workspace/data/xzenia/causal_memory.db') ... json.dump({'client': client_dict, 'run_id': run_id, ... 'findings': findings_list, 'actions': actions_list}, f, indent=2, default=str)
Recommendation

Use the skill only with trusted local Xzenia data, treat generated reports as confidential, and verify the source database contents before relying on the briefing.