Back to skill
Skillv1.1.0

ClawScan security

Google Workspace (gws CLI) · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 6, 2026, 1:03 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill appears to wrap the expected Google Workspace CLI and mostly matches its stated purpose, but there are inconsistencies and operational risks (undeclared env vars, a third‑party npm install, and an MCP server that exposes a broad surface) that you should understand before installing.
Guidance
This skill wraps the third-party `gws` CLI and is generally coherent with its purpose, but: (1) verify the npm package and upstream repository before installing (confirm publisher, checksum, and repository code), (2) never commit exported credentials.json to source control and prefer a service account with least-privilege scopes, (3) only set GOOGLE_WORKSPACE_CLI_TOKEN or credential file env vars on machines you fully trust, (4) be cautious with batch/delete examples — test on non-production data first, and (5) avoid enabling `gws mcp` (MCP server) unless you understand who can connect to it because it exposes all Workspace operations to remote clients. If you want a safer setup: run the CLI inside an isolated environment, use service accounts with scoped permissions, and review the npm package source code before trusting it with org data.

Review Dimensions

Purpose & Capability
okName and description map directly to the `gws` CLI and the install produces the `gws` binary; requested binary is exactly what the skill says it wraps. The claimed capabilities (Drive, Gmail, Calendar, Sheets, etc.) align with what the CLI exposes.
Instruction Scope
concernSKILL.md instructs the agent to read/write credential files, set environment variables, export unmasked credentials, and run destructive batch commands (e.g., delete files via xargs). It also documents running `gws mcp`, which exposes Workspace operations over an MCP server — increasing the attack surface. The instructions reference environment variables and filesystem paths that are not declared in the registry metadata.
Install Mechanism
noteThe install spec installs an npm package (@googleworkspace/cli) which is a reasonable distribution method for this CLI but is higher risk than an instruction-only skill because arbitrary code will be written to disk and a global binary will be created. The README links to an upstream GitHub repo and explicitly states the CLI is not an officially supported Google product; you should verify the npm package and upstream source before installing.
Credentials
concernRegistry metadata declares no required env vars, but the SKILL.md and references mention and require GOOGLE_WORKSPACE_CLI_CREDENTIALS_FILE, GOOGLE_WORKSPACE_CLI_TOKEN and other env variables (and .env file usage). The skill will operate with broad Workspace OAuth scopes if you grant them; ensure you only grant minimal scopes and use service accounts or domain-limited credentials where appropriate.
Persistence & Privilege
notealways:false and no explicit persistent modifications to other skills or system configs, which is good. However, the documented `gws mcp` server can expose Workspace operations to other agents/tools — this is effectively a network-exposed tool surface and should be enabled only when you understand and trust every client that can reach it.