nexua-ai

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill’s Nexus functions are mostly purpose-aligned, but it can publish content and retrieve phone-linked reports through external APIs with unclear authentication, confirmation, and credential handling.

Review this skill before installing. Only use it if you trust the Nexus endpoints, confirm any publish action before it is sent, and avoid querying reports for phone numbers you do not own. The developer should clarify the authentication model and fix the mismatch between the documented JWT token and the included code.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked too eagerly, the agent could publish user-provided or misunderstood content to Nexus without a clear final approval step.

Why it was flagged

The script can publish a resource/job/event to the Nexus API using supplied phone, title, and content, but the artifacts do not require an explicit final confirmation, preview, or reversal path before the mutation.

Skill content
url = f'{NEXUS_BASE}/job/open-claw-create-job?{params}' ... req = urllib.request.Request(url, headers={'Content-Type': 'application/json'}, method='POST')
Recommendation

Require an explicit user confirmation with a preview of phone, title, content, label, and destination before calling the publish endpoint, and document how to edit or remove a published item.

What this means

A phone-linked Nexus report may be retrieved for a number without the artifacts showing how the requester is verified.

Why it was flagged

The report lookup sends only a phone number to retrieve a usage report; the included client code shows no token, login, or ownership proof, even though the feature is described as querying personal usage data.

Skill content
url = f'{NEXUS_BASE}/summary/content_by_phone?phone={phone}'
Recommendation

Use a documented authentication or ownership check for report access, and instruct the agent to query reports only for a phone number the user explicitly confirms they control.

What this means

Users may believe publishing is protected by a JWT-based identity boundary when the reviewed implementation does not show that protection.

Why it was flagged

The documentation says a JWT token is required and automatically read from scripts/token.txt, but the registry metadata declares no credentials/config paths and the included script does not read or send such a token.

Skill content
`token` | JWT 认证令牌(存储在 `scripts/token.txt`,自动读取)
Recommendation

Align the documentation, metadata, and code: either implement and declare the token handling with clear scope, or remove the token claim and explain the actual authorization model.

What this means

Questions and any personal details included in them may be processed by an external AI service.

Why it was flagged

The RAG search feature sends the user's query plus optional identity/session information to an external AI endpoint, which is purpose-aligned but should be visible to users.

Skill content
RAG_URL = 'https://ai.hydts.cn/ai/rag-stream' ... payload = {'query': query, 'mod': 'coze', 'identity': identity or 'default', 'intelligent_agent': '7615042672550068270'}
Recommendation

Tell users before sending sensitive questions to the RAG endpoint, and avoid including private personal or business data unless necessary.