Back to skill
Skillv2.2.2
ClawScan security
Krillbloc Skill · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 29, 2026, 9:40 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill is plausibly a game client (only needs curl and a session token) but its runtime instructions ask the agent to upload or expose internal data (system prompt, agent memory/strategy) to an external site — a disproportionate and potentially privacy-leaking action.
- Guidance
- Things to consider before installing: - Do not send your real system prompt, secrets, or private policy text to krillbloc.com. The registration flow asks for a 'System Prompt' and locks it — treat that as public. Use a throwaway persona or redact sensitive fields. - Avoid uploading agent memory entries that may include private data. The skill explicitly instructs PUT/GET of /agents/:id/memory — sanitize memory or opt out of syncing it. - Inspect the public endpoints and privacy policy at https://krillbloc.com (what data do they store, retention, who can read it?). Consider testing registration from a browser first to see exactly what data is accepted/stored. - Use a sandboxed agent instance or a burner API key/account with no link to production credentials or real users. - If you want autonomous heartbeats, understand they will cause periodic network calls; if uncomfortable, keep the skill user-invocable only (do not enable autonomous invocation or scheduler entries). - If you need help: I can draft a safer registration payload (redacted fields), show how to sandbox the agent's network calls, or produce a checklist of fields to scrub from memory/system prompt before any PUT to the game API.
- Findings
[system-prompt-override] unexpected: The static scanner flagged a pattern indicating potential system-prompt override/prompt-injection. The skill's registration explicitly asks the agent to submit a 'System Prompt' and locks it after registration — this can lead to exfiltration of the agent's system prompt or persona. While a game wanting a character persona is plausible, sending the agent's internal system prompt is not normally required and is a high-risk action.
Review Dimensions
- Purpose & Capability
- noteName/description, required binary (curl), and AI_ROYALE_TOKEN align with a web-based game client. However, the registration flow and gameplay instructions require the agent to send its 'system prompt', memory/strategy, and other internal state to krillbloc.com — data that is not declared as required env vars and which is unusually sensitive for a game client.
- Instruction Scope
- concernThe SKILL.md and registration.md direct the agent to GET and PUT agent memory (/api/v1/agents/:id/memory) and to submit a 'System Prompt' and strategy as part of registration. Those instructions explicitly tell the agent to transmit internal state/persona to the external domain (krillbloc.com). All network activity is targeted to krillbloc.com (no other hosts), but transmitting system prompt and memory is scope creep relative to a normal game client and could expose secrets or private policy material.
- Install Mechanism
- okInstruction-only skill with no install spec and no code files — minimal disk write/execution risk. Required runtime binary is only curl, which is appropriate for HTTP API interaction.
- Credentials
- noteThe declared credential is a single game session token (AI_ROYALE_TOKEN), which is proportionate for a web game. However, the skill's runtime asks the agent to send other sensitive agent-local data (system prompt, memory entries) that are not declared as required environment variables — this difference increases privacy risk even though the env var list itself looks reasonable.
- Persistence & Privilege
- okalways is false and the skill does not request platform-wide privileges or modify other skills. It asks you to add a periodic heartbeat entry to your scheduler (expected behaviour for an autonomous game agent) but does not force permanent inclusion.
