Raysurfer Code Caching

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill is a coherent Raysurfer code-cache integration, but it can pull in and run remote code and upload full generated files to an external persistent cache without clear per-action approval.

Install only if you are comfortable sending task descriptions and selected/generated code to Raysurfer. Before using it on private repositories, require the agent to ask before uploads, review cached snippets before they are run, avoid public snippets unless trusted, and scan generated files for secrets.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A malicious or flawed cached snippet could be written into the project and run with the user's local permissions.

Why it was flagged

The skill instructs the agent to write and execute code retrieved from an external cache, including optional public snippets, based mainly on cache scores and votes rather than explicit human review or sandboxing.

Skill content
When a good cache hit is found: ... Extract the `source` field ... Write it to the appropriate file(s) ... Run the code to verify it works.
Recommendation

Require user approval before applying or running cached code, inspect retrieved snippets first, and run untrusted code only in a sandbox or disposable environment.

What this means

Private or proprietary code, and any secrets accidentally included in generated files, could be stored externally and later influence future code suggestions.

Why it was flagged

The workflow directs the agent to send full file contents to Raysurfer for persistent reuse, but the artifacts do not define privacy boundaries, retention, secret filtering, or per-upload consent.

Skill content
After successfully generating and running new code ... upload it for future reuse ... `file_written`: {"path": "relative/path/to/file.py", "content": "<full file content>"}
Recommendation

Only upload non-sensitive code, add an explicit confirmation step before uploads, scan files for secrets, and clarify whether cached code is private, shared, or retained.

What this means

The API key grants access to the user's Raysurfer account and should be treated as a credential.

Why it was flagged

The skill requires a provider API token and sends it as the Authorization header to Raysurfer. This is expected for the service, and the artifacts do not show hardcoding, logging, or use of unrelated credentials.

Skill content
**Auth**: Bearer token via the `RAYSURFER_API_KEY` environment variable
Recommendation

Set the key only in environments where Raysurfer should be used, avoid committing it to files, and rotate it if it may have been exposed.