web-test-reporter
Analysis
The skill is coherent as a web testing/reporting helper, but it can log in and perform confirmed create/edit/delete/approval/export actions, and its report template can save passwords, so it needs careful review before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
所有确认类操作必须走双路径(取消 + 确认)... 再次删除 → 确认... 点击导出 → 截图
The skill directs the agent to drive confirmed mutation, deletion, approval, and export flows through the target web app. Although it says to delete only self-created test data, the artifacts do not require staging-only use, rollback, or explicit user approval before the confirming branch.
必须使用 agent-browser... 报告为 Word .docx,用 Python `python-docx` 生成。
The skill depends on an external browser CLI and a Python package, but the provided install specification does not pin or install them. This is expected for the task, but users should verify the local tools they run.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
需要登录 → 询问租户(如有)、用户名、密码,获取后登录
The skill asks for web-app login credentials and then acts inside the application. This is expected for authenticated web testing, but it gives the agent the same privileges as the supplied account.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
para(doc, "账号:租户=园区智慧应用管理系统,用户=admin,密码=admin123")
The report-generation template writes an account and password into the persistent Word report. If replaced with real credentials, or if the sample credential is valid, the report becomes a sensitive credential-bearing artifact.
