Openclaw Aisa Web Search Tavily Hardened

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a straightforward AIsa/Tavily web-search helper that uses your AIsa API key and sends requested searches or URLs to AIsa, with no hidden persistence or unrelated data access evident.

Before installing, be comfortable sharing your search queries and requested URLs with AIsa's Tavily gateway and using your AIsa API quota. The artifacts do not show persistence, local file scanning, credential theft, or unrelated network destinations, but you should protect AISA_API_KEY and avoid using the skill for confidential internal searches unless the provider is approved for that data.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your AIsa API key is needed to run searches and may consume your provider quota.

Why it was flagged

The skill reads AISA_API_KEY from the environment and uses it as a bearer token for the AIsa API. This is expected for the stated service integration, and the artifacts do not show logging, hardcoding, or unrelated use of the credential.

Skill content
const apiKey = (process.env.AISA_API_KEY ?? "").trim(); ... "Authorization": `Bearer ${apiKey}`,
Recommendation

Use a dedicated or limited-scope AIsa key if available, keep it out of shared logs, and unset it when not needed.

What this means

AIsa/Tavily can receive the searches you run, and the extract script similarly sends requested URLs to the provider.

Why it was flagged

Search requests are sent to AIsa's external API gateway. This is disclosed and purpose-aligned, but it means user-provided search terms leave the local environment.

Skill content
await fetch("https://api.aisa.one/apis/v1/tavily/search", { ... body: JSON.stringify(body), });
Recommendation

Avoid sending confidential queries, private URLs, or sensitive internal information unless you are comfortable with AIsa's handling of that data.

What this means

You have less independent provenance information about who maintains the skill or where the published code came from.

Why it was flagged

The registry metadata does not provide a source repository. The included code is present and there is no install spec or remote installer, so this is a provenance note rather than evidence of unsafe behavior.

Skill content
Source: unknown
Recommendation

Prefer installing from a trusted registry account, and review the included scripts before use if provenance matters for your environment.