Back to skill
Skillv1.0.0
ClawScan security
Mdnew · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 14, 2026, 10:57 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill does what it claims (forwards a user-supplied URL to the external markdown.new service and prints the returned Markdown), but it will send arbitrary target URLs to an unknown third-party service with no safeguards—this risks leaking sensitive URLs or content and the SKILL.md/code provide no warnings or validation.
- Guidance
- This skill will instruct an external service (markdown.new) to fetch whatever URL you pass it. That can leak sensitive data in two ways: (1) URLs often contain tokens or query parameters that reveal secrets, and (2) you may unintentionally ask the external service to fetch internal-only endpoints. Before installing or using: (a) verify who runs markdown.new and whether you trust that operator, (b) never pass URLs containing secrets or authentication tokens, (c) avoid pointing the tool at internal/private network addresses, (d) consider adding URL validation/whitelisting or percent-encoding before sending, and (e) if you need to process sensitive pages, run a local/managed converter instead of an unknown third-party. If you want me to, I can suggest safer local alternatives or propose a small patched script that validates/encodes URLs and warns about internal addresses.
Review Dimensions
- Purpose & Capability
- okName/description match the actual behavior: the script queries markdown.new for a converted Markdown version of a provided URL. No unrelated credentials, binaries, or installs are requested.
- Instruction Scope
- concernThe runtime instructions and script instruct the agent to send arbitrary target URLs to an external service (https://markdown.new/<url>) and then print the response. There is no input validation, no URL encoding, and no warning about sending internal or sensitive URLs or query strings to a third party. That means URL contents or secrets embedded in URLs could be exposed to an external operator.
- Install Mechanism
- okInstruction-only skill with an included small Python script and no install steps—no code is downloaded at install time. This is lower risk from an installation perspective.
- Credentials
- okThe skill requests no environment variables or credentials, which is consistent with its stated purpose. However, the code nonetheless causes data about arbitrary targets to be transmitted to a third party, which is not controlled by environment settings.
- Persistence & Privilege
- okalways:false (no forced inclusion). The skill can be invoked autonomously by default (platform normal), but it does not request persistent privileges or modify other skills.
