AI Daily Digest

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.env_credential_access

Findings (1)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your Gemini API key may remain on disk after the digest runs and could be reused by future runs or exposed to anyone with access to that local file.

Why it was flagged

The skill asks for an AI provider API key, uses it as an environment variable, and stores it in a persistent local config file for reuse.

Skill content
配置文件路径: `~/.hn-daily-digest/config.json` ... `"geminiApiKey": ""` ... `export GEMINI_API_KEY="<key>"`
Recommendation

Use a limited-scope API key if available, avoid sharing the config file, and delete `~/.hn-daily-digest/config.json` or rotate the key if you no longer trust the environment.

What this means

Running the skill may execute a runtime package downloaded at run time, which adds normal package-supply-chain risk.

Why it was flagged

The skill discloses that it runs the TypeScript script through `npx -y bun`, which may fetch the Bun runtime from the package ecosystem without a pinned version.

Skill content
`npx -y bun ${SKILL_DIR}/scripts/digest.ts` ... `bun` 运行时(通过 `npx -y bun` 自动安装)
Recommendation

If you want tighter control, install and pin Bun yourself from a trusted source, then adapt the command to use the local pinned runtime.

Findings (1)

critical

suspicious.env_credential_access

Location
scripts/digest.ts:1049
Finding
Environment variable access combined with network send.