Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
sprint-release-notes
v1.0.1Automatically generate sprint release notes from a GitHub Project Board and publish to their respective repositories. Groups completed items by repository, g...
⭐ 0· 46·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill's stated purpose (read a GitHub Project board, compile per-repo release notes, and publish GitHub Releases) is coherent with the included Python script which uses the GitHub GraphQL and REST APIs. However the registry/metadata shows no required credentials or env vars while the SKILL.md explicitly requires a GitHub PAT and the scripts expect a PAT in references/config.yaml. That mismatch (manifest claiming no credentials but runtime needing a PAT with repo/write scopes) is a material inconsistency.
Instruction Scope
SKILL.md instructs the agent to query Projects v2, read PRs, commits, README and docs via the GitHub API — all within the stated purpose. The instructions also refer to local reference files (github-queries.md and contributor-scoring.md) which are present. One note: the skill's docs/README do not mention an optional Discord webhook, but references/config.yaml contains a webhook_url entry (and could be used by code paths); that introduces an extra external endpoint not described in SKILL.md.
Install Mechanism
No install spec is provided (instruction-only), and included scripts are plain Python/bash. The Python script requires the 'requests' library, which is expected. No network download/install from arbitrary URLs or package registries is present.
Credentials
The skill needs a GitHub PAT with repository and project access to function (SKILL.md specifies scopes 'repo', 'read:org', 'project'), which is appropriate for publishing releases. But the registry entry lists no required env vars and no primary credential — a mismatch that hides the need for a high-privilege token. Additionally, references/config.yaml includes an optional Discord webhook field; storing a PAT or sending data to a webhook would permit external transmission of potentially sensitive data if the code uses that webhook path.
Persistence & Privilege
The skill is not marked always:true and does not request system-wide persistence. The included run script runs the generator in --dry-run by default. There is no evidence the skill modifies other skills or global agent configuration.
What to consider before installing
Things to consider before installing or running this skill:
- It requires a GitHub Personal Access Token (PAT) with repository (write) and Projects access to create/update Releases. The registry metadata does NOT declare this; expect the skill to ask you for the PAT at runtime or to read it from the included references/config.yaml file.
- The package includes a sample references/config.yaml where users might be tempted to paste their PAT. Storing long-lived tokens in plaintext files is risky; prefer using a short-lived token or entering the token interactively and avoid committing it to disk or version control.
- The code and instructions are coherent with the stated purpose (reading ProjectV2, PRs, commits, README, creating Releases), but the presence of a Discord webhook entry in references/config.yaml is not documented in SKILL.md. Confirm whether the script actually sends data to that webhook before providing secrets — this could be an unexpected external sink.
- Run the included script with --dry-run first (the run script defaults to dry-run) and review generate_release_notes.py fully to confirm where it posts outputs and whether it transmits anything outside GitHub.
- Restrict the PAT's scope and lifetime (limit to only the repos/orgs needed, consider a repo-scoped token or a token with minimal write scope), and monitor its usage. If you cannot verify why the token is required or where outputs go (especially to the webhook), do not provide a PAT.
- Ask the publisher to update the registry metadata to declare the required credential and to document webhook behavior explicitly. If you want higher assurance, request that the skill avoid storing credentials in local files and only accept tokens interactively or via well-documented environment variables.Like a lobster shell, security has layers — review code before you run it.
latestvk9767r6wx3jgswdpsyqk4dkt2n84h55w
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
