Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Vendor Compliance 1099
v1.0.21099 vendor compliance pipeline for accounting firms. Pulls full-year General Ledger from QBO, aggregates vendor payments, applies IRS $600 threshold, classi...
⭐ 0· 122·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill claims to pull a full-year General Ledger from QBO and persist W-9/TIN state, yet the registry entry lists no required credentials, no environment variables, and no code files. A pipeline path (scripts/pipelines/vendor-compliance-1099.py) is referenced but absent. Asking to access QBO without declaring how to authenticate is inconsistent with the stated purpose.
Instruction Scope
SKILL.md instructs running a Python script, reading/writing persistent cache files under .cache/vendor-compliance-1099, and classifying transactions by memo/keywords. It therefore expects filesystem access and QBO data access; those actions are not scoped or constrained (no auth flow, no explicit external endpoints), and the skill directs persistence of sensitive PII (TINs) to local JSON caches without guidance on encryption or protection.
Install Mechanism
There is no install spec and no code shipped — this is lower install risk. However, that also means the runtime instructions reference files that are not present, which is an incoherence rather than an install risk.
Credentials
The task requires access to accounting data and vendor TINs but declares no primary credential or required env vars. In practice it will need QBO credentials or API tokens and likely access to local filesystem where caches live. The omission is disproportionate and unexplained. Also persisting TINs/W-9s in plain .cache JSON is a sensitive-data handling concern.
Persistence & Privilege
The skill intends to persist per-client state across runs in .cache/vendor-compliance-1099 (W-9 and TIN JSON files and year snapshots). Persisting PII is expected for a tracker, but there is no instruction about secure storage, encryption, retention, or access controls. always:false (no forced global presence) is appropriate.
What to consider before installing
This SKILL.md looks like a recipe for a local Python pipeline, but the package is incomplete and raises several red flags you should resolve before using it:
- Missing code and auth: The instructions reference scripts/pipelines/vendor-compliance-1099.py and QBO pulls, but no code or authentication flow is provided. Ask the publisher for the actual code and clear QBO auth instructions (OAuth client, environment variables, or secure token storage). Do not supply QBO credentials until you confirm how they will be used and stored.
- Sensitive persistent data: The skill stores W-9 and TIN data in .cache/*.json. Confirm how those files are protected (encryption at rest, file ACLs, retention policy). If you run this, prefer a sandbox environment and ensure backups/encryption are in place.
- Incomplete security guidance: There is no mention of where API tokens are read from, whether logs contain PII, or whether the Excel output contains masked TINs. Get explicit handling rules for PII and audit logging from the author.
- Don’t run arbitrary commands: Because the code is not bundled, the SKILL.md could be a template for a local script expected to exist in your environment. Only run it after you (or a trusted developer) have inspected the actual script files and confirmed they do what is described.
- If you still want to try it: run in an isolated sandbox with test data (--sandbox or --skip-gl), inspect all generated .cache files and the produced Excel workbook, and verify no credentials are exfiltrated. Prefer least-privilege QBO access (read-only account scoped to the needed company) and rotate any tokens after testing.
If the publisher provides the missing code and clear authentication + PII-handling controls, re-evaluate; as-is the skill is internally inconsistent and potentially risky.Like a lobster shell, security has layers — review code before you run it.
latestvk97ekatq0fnpkrkded3384x47983dqex
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
