Ag Model Usage

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill needs review because it is presented as local CodexBar usage reporting but actually reads a stored Google Antigravity OAuth token and calls Google internal quota APIs.

Treat this as a Review item, not proven malware. Install it only if you intentionally want it to use your Google Antigravity OAuth profile at ~/.openclaw/agents/main/agent/auth-profiles.json to query quota data, and verify the publisher/metadata mismatch first.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may install it expecting a local usage summary, while it actually uses a stored Google Antigravity account token.

Why it was flagged

The headline description says local CodexBar cost usage, but the same artifact later says it reads OAuth tokens and calls Google. This mismatch can cause users to underestimate credential and external account access.

Skill content
description: Use CodexBar CLI local cost usage... / 该技能通过读取 `auth-profiles.json` 中的 OAuth 令牌...向 Google 发起配额查询请求。
Recommendation

Align the public description with the real behavior, clearly declare the credential/config path, and require explicit user consent before using stored account tokens.

What this means

The skill can act with the user's stored Google Antigravity OAuth credential to query account/project quota data.

Why it was flagged

The script reads a local OpenClaw auth profile and uses the OAuth access token as a Bearer credential. The submitted requirements declare no primary credential or required config path, so this account access is under-declared.

Skill content
auth_path = os.path.expanduser("~/.openclaw/agents/main/agent/auth-profiles.json") ... access_token = profile['access'] ... "Authorization": f"Bearer {access_token}"
Recommendation

Only install if you intend to let the skill use that Google Antigravity auth profile; the publisher should declare the credential path, token scope, destination API, and remove or justify any hard-coded project fallback.

What this means

It is harder to confirm that the packaged artifact and registry listing come from the same publisher identity.

Why it was flagged

This packaged owner ID differs from the registry metadata owner ID supplied for the skill. That provenance inconsistency is not malicious by itself, but it should be resolved for a skill that reads credentials.

Skill content
"ownerId": "kn7ffybxre15amw93mrgh8wksd80jzny"
Recommendation

Verify the publisher and request corrected metadata before trusting the skill with stored OAuth credentials.