SmartSaaS

ReviewAudited by ClawScan on May 18, 2026.

Overview

SmartSaaS is a coherent SaaS-management skill, but one central script disables HTTPS certificate checks while sending the API key, and the skill has broad account-changing capabilities users should review carefully.

Review before installing. If you use it, set a narrowly scoped SmartSaaS API key, fix or avoid the add-to-dataset script until TLS verification is corrected, and only run mutating actions such as integrations, campaigns, emails, team changes, and cron/webhooks when you explicitly intend them.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A network attacker or misconfigured proxy could potentially capture the SmartSaaS API key or alter dataset item requests.

Why it was flagged

This script sends the SmartSaaS bearer API key with curl while disabling HTTPS certificate validation for any HTTPS base URL, not just localhost. That can expose the API key and dataset updates to interception or tampering.

Skill content
AUTH_HEADER="Authorization: Bearer $KEY"
CURL_OPTS="-s -S"
[[ "$BASE" == https://* ]] && CURL_OPTS="$CURL_OPTS -k"
Recommendation

Remove global `-k`; only allow insecure TLS for explicit localhost development, validate the base URL, and rotate the API key if it may have been used over an untrusted network.

What this means

Anyone or any agent action using this key may be able to read or change business data in SmartSaaS within the key's permissions.

Why it was flagged

The API key is expected for this integration and the artifacts say not to echo it, but it can grant read/write access to SmartSaaS account resources.

Skill content
The API key is created in SmartSaaS (APIScreen) with permissions such as `data:read`, `data:write`, `projects:read`, `projects:write`. Do not log or echo the API key.
Recommendation

Use a least-privilege SmartSaaS API key scoped only to the actions you need, and revoke or rotate it if the skill or local repo is no longer trusted.

What this means

A cron configuration could continue triggering SmartSaaS/OpenClaw events until disabled.

Why it was flagged

The skill can configure scheduled backend jobs that may keep dispatching webhook payloads after the current conversation. This is disclosed and purpose-aligned, but it is persistent behavior.

Skill content
# POSTs cron/schedule config to SmartSaaS. Backend may use this to register jobs that dispatch to the openclaw webhook.
# Config typically includes: schedule (cron expression or name), payload, enabled, etc.
Recommendation

Only configure cron/webhook jobs when explicitly needed, review the payload and schedule, and keep a clear way to disable or audit active jobs.

What this means

If the local repo path is replaced or modified, OpenClaw may load changed skill code outside the normal install flow.

Why it was flagged

The documented install path relies on a local repo loaded through extraDirs rather than a normal install spec. That can be legitimate, but users must trust the local files they add.

Skill content
This skill is not installed via clawhub. Tell the user: (1) Add the path to this repo's `skills` folder to `skills.load.extraDirs` in `~/.openclaw/openclaw.json`.
Recommendation

Install only from a trusted local checkout, review updates before restarting OpenClaw, and keep the skill directory permissions controlled.