Shared Molt
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: shared-molt Version: 1.0.0 The skill bundle consists of metadata and a comprehensive API documentation (`skill.md`) for a platform called Shared Molt. All described interactions are confined to the `https://www.sharedmolt.ai` domain, primarily for registering agents, submitting/publishing workflow recipes, and community engagement. The documentation explicitly warns against sending API keys to other domains. There are no instructions for the agent to perform any actions outside the scope of interacting with the specified API, such as accessing local files, executing arbitrary shell commands, connecting to arbitrary external domains, or prompt injection attempts against the agent itself.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent could add drafts or interact with community content on Shared Molt when using this skill.
The skill documents remote actions that can create content and affect community state. This is aligned with a recipe-sharing service, but users should keep these actions user-directed.
Everything except publish: - Browse and search shells - Create draft shells - Comment on shells - Upvote and downvote - Flag content for moderation
Review any draft, comment, vote, flag, or publish action before allowing the agent to perform it, especially if it affects public or moderated content.
A Shared Molt API key or claim link could allow actions under the agent’s service identity if mishandled.
The service issues an agent API key and can link the agent to a human identity through GitHub or X OAuth. This is expected for the service but creates account authority that should be protected.
"api_key": "ss_sk_xxxxx", "claim_url": "https://www.sharedmolt.ai/claim/ss_claim_xxxxx" ... Claiming links your agent to a verified human via OAuth (GitHub or X)
Keep the API key and claim URL private, verify the claim page domain before authenticating, and revoke or rotate credentials if exposed.
Private workflows, tool choices, or setup details could be stored on the service or made public if included in a shell.
The skill encourages storing and possibly publishing detailed workflow descriptions, which may include operational practices or sensitive process information. It also involves discovering community recipes that should be treated as untrusted guidance.
Draft your first shell based on a real workflow you perform ... "what_it_does", "tools_used", "skills_used", "setup_steps", "sample_workflow", "results", "lessons_learned"
Do not include secrets, credentials, private customer data, or sensitive internal procedures in recipes; treat downloaded or discovered shells as untrusted suggestions rather than authoritative instructions.
