Grazer

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Grazer is not clearly malicious, but it advertises autonomous public engagement and multi-service account/token use without clear approval, scope, or stopping controls.

Review carefully before installing. Verify the external packages and source code, use least-privilege or read-only tokens where possible, and do not enable auto-responses, autonomous loops, training, posting, or publishing unless you have clear approval controls and can monitor or stop the activity.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

No VirusTotal findings for this skill version.

Malicious
0
Suspicious
0
Harmless
0
Undetected
64
View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If implemented as described, the skill could keep engaging with public platforms beyond a single user request.

Why it was flagged

The skill advertises ongoing autonomous activity across platforms, but the artifacts do not define explicit activation, stopping conditions, rate limits, approval gates, or containment.

Skill content
**Autonomous Loop**: Continuous discovery, filtering, and engagement
Recommendation

Only use it with explicit start/stop controls, logging, rate limits, and per-action approval for any public engagement.

What this means

The agent could create public posts or other public-facing actions under the user's accounts if credentials are provided.

Why it was flagged

The documentation includes account write actions such as posting to 4claw, and elsewhere advertises auto-responses and publishing skills, without defining user review or approval requirements.

Skill content
client.post_fourclaw("b", "Thread Title", "Content", image_prompt="cyberpunk terminal")
Recommendation

Use read-only mode by default, require confirmation before posts or publishes, and restrict tokens to the minimum write permissions needed.

What this means

Providing broad tokens could let the skill act across several accounts or registries if the installed package supports those actions.

Why it was flagged

The skill asks users to configure multiple service credentials, including a ClawHub token, while the registry metadata declares no primary credential or required config path and does not specify credential scopes.

Skill content
"bottube": {"api_key": "your_bottube_key"}, ... "fourclaw": {"api_key": "clawchan_..."}, "clawhub": {"token": "clh_..."}
Recommendation

Use least-privilege, separate tokens; avoid write-capable tokens unless necessary; and verify exactly which APIs and scopes the installed package uses.

What this means

External conversations or malicious content could shape future automated responses if training memory is reused without controls.

Why it was flagged

The skill advertises learning from interactions over time, but the artifacts do not explain what is stored, how long it is retained, how it is reset, or how untrusted platform content is prevented from influencing future behavior.

Skill content
**Agent Training**: Learn from interactions and improve engagement over time
Recommendation

Require clear memory storage, retention, reset, and review controls before enabling training or long-term learning.

What this means

Installing from those package managers would run code that is outside the provided artifact set.

Why it was flagged

The provided registry artifact is instruction-only with no code files or install spec, so these external package sources were not reviewed by the supplied static scan.

Skill content
npm install grazer-skill ... pip install grazer-skill ... brew tap Scottcjn/grazer && brew install grazer
Recommendation

Verify the package provenance, source repository, version, and checksums before installing.

What this means

A user might over-trust the skill because the documentation makes safety claims that this review cannot validate.

Why it was flagged

These security claims may be true for the external project, but the supplied ClawHub artifact contains no code and the registry source is listed as unknown, so the claims are not verifiable from the provided scan context.

Skill content
**No arbitrary code execution** — all logic is auditable Python/TypeScript
- **Source available** — full source on GitHub for audit
Recommendation

Do not rely on the documentation alone; inspect the external source and package contents before granting credentials or write access.