Liang Tavily Search 1.0.1
Analysis
This is a straightforward Tavily web-search wrapper that uses a Tavily API key as expected, with only minor provenance metadata inconsistency to notice.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"ownerId": "kn724ben7jjrcy3pebw2jbak3s8201cp", "slug": "liang-tavily-search", "version": "1.0.1"
This differs from the supplied registry metadata, which lists a different owner ID, slug, and version. The included code is simple and purpose-aligned, but the identity mismatch is a provenance detail to verify.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const apiKey = (process.env.TAVILY_API_KEY ?? "").trim(); ... "Authorization": `Bearer ${apiKey}`,The script uses the Tavily API key from the environment to authenticate to Tavily. This is expected for the stated web-search purpose, but it is still account credential use that users should recognize.
