C.R.A.B Deploy Agent

ReviewAudited by ClawScan on May 10, 2026.

Overview

This looks like a real deployment helper, but it can publish code and apps to GitHub and Cloudflare with unclear file, account, and domain safeguards.

Review the script and run deployment steps manually. Before pushing or deploying, confirm the exact project directory, files to be committed, GitHub repo visibility/account, Cloudflare account, and domain. Avoid the default `sheraj.org` domain unless you know it is intended and controlled by you or your organization.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill could publish the wrong project, include unintended files, or deploy to the wrong target if invoked from the wrong context.

Why it was flagged

These are high-impact account and publishing actions. The artifacts do not clearly bound which local directory/files are pushed, repo visibility, target account, or whether the user sees a final preview before mutation.

Skill content
`deploy-agent push my-app [repo-name]` Creates GitHub repo and pushes code. ... `deploy-agent deploy my-app [custom-domain]` Deploys to Cloudflare Pages.
Recommendation

Before using push or deploy, verify the working directory, git status, target GitHub account/repo visibility, Cloudflare account, and deployment domain. The skill should add explicit previews and confirmations before gh/wrangler mutations.

What this means

A user could unintentionally try to publish their app under a domain they do not control, or trust a default domain without understanding who owns it.

Why it was flagged

The default deployment domain is a specific external domain that is not explained as user-controlled or project-specific.

Skill content
Deploys to Cloudflare Pages. Default domain: `{name}.sheraj.org`
Recommendation

Use an explicitly user-owned domain or Cloudflare Pages default domain unless the user confirms that `sheraj.org` is intended and under their control.

What this means

Commands may act with whatever permissions your local GitHub and Cloudflare sessions have.

Why it was flagged

The skill relies on local Cloudflare credentials, and likely local GitHub CLI authentication, to perform deployment actions. This is expected for the purpose but sensitive.

Skill content
Cloudflare token should be configured in `~/.wrangler.toml`
Recommendation

Use least-privilege Cloudflare tokens and verify `gh`/`wrangler` are authenticated to the intended accounts before running deployment commands.

What this means

The skill may fail or behave unexpectedly if jq/npm are missing or different from what the user expects.

Why it was flagged

The script uses jq and npm-related commands, while the registry requirements only list gh, wrangler, and git. This is a dependency declaration gap, not evidence of malicious behavior.

Skill content
echo "$state" | jq -r ... npm list next ... npm list @cloudflare/next-on-pages
Recommendation

Confirm all required tools are installed and review the shell script before use, especially because there is no separate install spec.

What this means

Deployment metadata remains on disk after the session and could be reused by later commands.

Why it was flagged

Deployment status, repo URL, and domain are stored persistently across sessions. No token storage is shown.

Skill content
State stored in: `~/.clawdbot/skills/deploy-agent/state/{deployment-name}.json`
Recommendation

Use the cancel/cleanup flow when done and avoid putting secrets in deployment names or state fields.