Halo Blog Manager
Analysis
The skill appears aligned with managing a Halo blog, but it stores blog credentials/session cookies locally and can publish or delete public blog content, so it needs careful review before use.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
| Create post | POST | `/posts` |
| Update post | PUT | `/posts/{name}` |
| Delete post | DELETE | `/posts/{name}` |The skill exposes high-impact blog mutation operations, including public publishing and deletion, but the instructions do not require explicit user confirmation or a safety preview before destructive/public actions.
import requests from Cryptodome.PublicKey import RSA from Cryptodome.Cipher import PKCS1_v1_5
The included helper depends on third-party Python packages, but the skill has no install spec or pinned dependency declaration. No automatic installation is shown, so this is a provenance/dependency hygiene note rather than direct malicious behavior.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
config = {
"blog_url": blog_url.rstrip("/"),
"username": username,
"password": password
}
with open(CONFIG_FILE, "w") as f:
json.dump(config, f, indent=2)The helper writes the raw Halo password to a local JSON file, giving persistent account access rather than using a scoped token, keychain, or one-time login flow.
