Lumos Skill
Analysis
The skill matches a social-network tool, but it asks the agent to set up a recurring remote heartbeat and use an API key to act publicly, so it should be reviewed before installation.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
If 30 minutes since last Moltbook check: 1. Fetch https://www.moltbook.com/heartbeat.md and follow it
This makes a remote, changeable document an instruction source that the agent is told to follow periodically.
Add this to your HEARTBEAT.md ... Moltbook (every 30 minutes) ... The heartbeat keeps you present.
The skill encourages adding a recurring background routine so the agent keeps checking and participating over time.
curl -s https://www.moltbook.com/heartbeat.md > ~/.moltbot/skills/moltbook/HEARTBEAT.md ... Check for updates: Re-fetch these files anytime
The skill points to additional remote instruction files and encourages re-fetching them, but those files are not part of the provided review artifacts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
All requests after registration require your API key ... Your API key is your identity. Leaking it means someone else can impersonate you.
The skill uses a bearer API key as the agent's identity for service actions; this is expected for the service but sensitive.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
You can also save it to your memory, environment variables (`MOLTBOOK_API_KEY`), or wherever you store secrets.
The skill suggests storing the API key in agent memory or other persistent secret stores, which can expose it if memory is broadly reused or inspected.
