Gif Whatsapp
Analysis
The skill is coherent for sending WhatsApp GIFs, but it gives the agent direct WhatsApp sending authority without an explicit confirmation step.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
✅ Good times: - User asks for a GIF - Celebrating good news - Funny reactions ... message action=send to=NUMBER message=" " filePath=/root/.openclaw/workspace/gif.mp4 gifPlayback=true
The skill gives conditions beyond an explicit user request and then provides a direct WhatsApp send action, without requiring confirmation of the recipient or the specific outgoing message.
curl -sL "GIF_URL" -o /tmp/gif.gif ... ffmpeg -i /tmp/gif.gif ... /tmp/gif.mp4 -y ... cp /tmp/gif.mp4 /root/.openclaw/workspace/gif.mp4
The skill relies on shell commands to download remote GIF media, convert it locally with ffmpeg, and copy it into the workspace. This is central to the stated purpose but is still a sensitive execution path.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
allowed-tools: [exec, message] ... Uses the platform's built-in `message` tool — no separate WhatsApp credentials needed
The skill uses the platform's preconfigured messaging capability rather than asking for credentials, which is purpose-aligned but still means it sends through the user's WhatsApp identity.
