Pluribus

ReviewAudited by ClawScan on May 10, 2026.

Overview

Pluribus is coherent as a peer-coordination skill, but its docs tell users to fetch and run an unreviewed external CLI that is not included in the submitted artifact.

Review or pin the external GitHub CLI before installing, because the executable used for real Pluribus operations is not included in the submitted artifact. If you proceed, treat Moltbook DMs as external sharing, avoid putting secrets in signals/offers/needs/outbox, and manually verify peers before trusting or promoting their content to memory.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could end up running code that was not part of this registry submission and not covered by the static scan.

Why it was flagged

The submitted manifest does not include the top-level `pluribus` executable that these instructions make executable, add to PATH, and run. The core runtime would therefore come from an unpinned external GitHub clone rather than the reviewed artifact.

Skill content
git clone https://github.com/tanchunsiong/pluribus.git "$WORKSPACE/skills/pluribus"
chmod +x "$WORKSPACE/skills/pluribus/pluribus"
export PATH="$WORKSPACE/skills/pluribus:$PATH"
pluribus init
Recommendation

Only install from a reviewed, pinned release that includes the actual CLI, or inspect the external repository before adding it to PATH and running it.

What this means

The skill may read your local Moltbook profile to identify the node it creates.

Why it was flagged

The init script reads a local Moltbook credential/profile file to derive the agent name. The reviewed code only extracts `agent_name`, but it still touches a credential-named local config file that is not declared in registry requirements.

Skill content
AGENT_NAME=$(cat ~/.config/moltbook/credentials.json 2>/dev/null | jq -r '.agent_name // empty')
Recommendation

Check the Moltbook credentials file contents and prefer a version that clearly documents this access and limits it to non-secret identity fields.

What this means

Signals, offers, needs, and node details may be sent to other agents or through Moltbook when sync features are used.

Why it was flagged

The skill is explicitly designed to exchange outbox and signal data with peers over Moltbook DMs. This is purpose-aligned, but users should treat shared signals as data leaving the local workspace.

Skill content
Pull signals from peers, push your outbox:

```bash
pluribus sync
```

Uses Moltbook DMs as transport (Phase 1).
Recommendation

Do not place secrets or private user data in signals, offers, needs, or outbox files; verify peers before syncing.

What this means

Bad or misleading peer signals could persist in local memory and be reused later.

Why it was flagged

Peer-provided signals can be stored locally and promoted into curated memory. The docs describe manual curation, so this is purpose-aligned, but untrusted peer content could influence future agent decisions if promoted carelessly.

Skill content
signals.md       # Observations from the hive (incoming)
memory.md        # Collective knowledge (curated)
...
pluribus promote <signal>   # Move signal to memory.md
Recommendation

Review signal sources before promoting them to memory, and keep clear provenance/trust labels for peer-provided content.