Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Analyst Mastery — World-Class AI Signal Intelligence System
v1.0.0World-class autonomous data analysis, signal detection, and operational intelligence skill system. Use ANY time the user asks to analyze, measure, track, rep...
⭐ 0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's declared purpose is data analysis and monitoring, which fits the included reference material. However, the packaged documents embed a hard-coded Gumroad API token and explicit local paths (e.g., /Users/oliverhutchins1/.openclaw/...) and sample commands that read local cron logs and AgentReach status. A coherent skill would declare required credentials and config paths or ask the user to provide them; this one does neither. The presence of a plaintext API token and direct references to a particular user's home directory are disproportionate and unexplained by the skill metadata.
Instruction Scope
SKILL.md and the reference files explicitly instruct the agent to read local files (cron jobs, project JSON logs, AgentReach status), collect personally identifiable buyer data (emails from Gumroad responses), and call multiple external APIs (Gumroad, Pinterest, Twitter/X, Reddit). Those reads/calls are not listed in requires.env or required config paths. The instructions also tell the agent to 'trigger aggressively' on many broad keywords, increasing invocation frequency and likelihood of access to local/system data. The explicit sample code in COMPANY-INTEGRATION.md contains a bearer token hard-coded into the doc — this both exposes a credential and suggests the skill expects to use it without requesting it from the environment.
Install Mechanism
This is an instruction-only skill with no install spec and no code files to be executed; that reduces supply-chain risk. There is no installer downloading external artifacts. However, being instruction-only does not eliminate risk because the runtime instructions tell the agent to access local files and external APIs.
Credentials
requires.env is empty despite the skill expecting many service credentials (Gumroad, Pinterest, X, Reddit, AgentReach, Google Analytics) in its data-collection instructions. Worse, a Gumroad bearer token is embedded in COMPANY-INTEGRATION.md as plaintext. The skill also describes collecting buyer emails and other sensitive fields. Requesting none of these credentials in metadata while shipping a hard-coded token is disproportionate and suspicious.
Persistence & Privilege
always is false (good). The skill's SKILL.md asks for 'aggressive' triggering on many keywords; combined with autonomous invocation (platform default), that can lead to frequent, possibly autonomous executions that access local files and APIs. This increases blast radius but is not an explicit privilege escalation in metadata.
What to consider before installing
Do not enable or run this skill until you verify provenance and fix obvious issues. Specific steps to consider: 1) Confirm who published this skill and whether that publisher should have access to your Gumroad/GitHub/local system data. 2) Remove or rotate the hard-coded Gumroad token found in COMPANY-INTEGRATION.md — treat it as compromised. 3) Require the skill to declare any credentials it needs (avoid embedding secrets in docs); supply credentials via secure environment variables or secret store only if you trust the publisher. 4) Audit which local files the skill will read (cron logs, project JSON, AgentReach workspace) and ensure they don't expose sensitive data; run the skill in an isolated sandbox first. 5) Consider restricting the skill's invocation scope (avoid aggressive keyword triggers and/or disable autonomous invocation) until you validate behavior. 6) If you decide to proceed, monitor outgoing network calls and logs for unexpected exfiltration (buyer emails, tokens, or other PII). If you cannot confirm the token's legitimacy or the publisher's identity, mark this skill untrusted and do not install.Like a lobster shell, security has layers — review code before you run it.
analyticsvk978v6k1sf6hvxgm63wpz5w18n83ba94datavk978v6k1sf6hvxgm63wpz5w18n83ba94intelligencevk978v6k1sf6hvxgm63wpz5w18n83ba94kpivk978v6k1sf6hvxgm63wpz5w18n83ba94latestvk978v6k1sf6hvxgm63wpz5w18n83ba94metricsvk978v6k1sf6hvxgm63wpz5w18n83ba94performancevk978v6k1sf6hvxgm63wpz5w18n83ba94reportingvk978v6k1sf6hvxgm63wpz5w18n83ba94signalsvk978v6k1sf6hvxgm63wpz5w18n83ba94
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
