Reproduce
Analysis
This looks like a legitimate sub-agent spawning skill, but it can send task context to external AI providers and delegate powerful tools to child agents, so it should be reviewed before installation.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
File-access tools allow children to read and write arbitrary paths. Only supply tools you would trust the parent to use directly.
The skill supports passing tools to spawned child agents, and the artifacts explicitly acknowledge that file-access tools can grant arbitrary read/write access without artifact-enforced path allowlists or per-action approval.
"spawn_agents": true, "async_support": true, "max_spawn_depth": 3, "supported_strategies": ["sequential", "parallel-gather", "fire-and-forget"]
The manifest discloses agent spawning, async operation, bounded recursion, and fire-and-forget strategies. This is aligned with the skill purpose but is a capability users should notice.
"dependencies": { "pip": [ "litellm>=1.40.0" ] }The skill depends on LiteLLM with a lower-bound version range rather than a pinned version. The dependency is expected for multi-provider model access, but version ranges can change installed code over time.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"env_note": "At least one provider API key is required at runtime. Which key depends on the model= argument passed to spawn_openclaw()."
The skill requires delegated provider credentials to run child LLM calls. This is expected for the stated purpose, but it uses the user’s provider account and may incur cost or expose account-level privileges.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
progress_so_far is sent to the provider API and visible to the child agent — sanitize snapshots and strip secrets before spawning.
The skill explicitly transmits parent task context to an external provider and to a child agent. This is disclosed and purpose-aligned, but it creates a sensitive data boundary.
progress_so_far is sent to the Anthropic API and injected into the child's context.
The child agent relies on a parent-generated progress snapshot as context. If that snapshot contains untrusted instructions or misleading summaries, the child may over-trust them.
