Hey summon

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

HeySummon mostly matches its stated human-help purpose, but it needs review because it can share context externally while making questionable encryption claims and includes risky credential, persistence, and Git auto-sync handling.

Install only if you trust HeySummon and the selected providers. Before use, remove or rotate any exposed client key, disable or review auto-sync, add a strict .gitignore, restrict permissions on .env/providers.json/.keys, and require explicit approval with redacted context before sending help requests.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Sensitive chat, project, or business details could be sent to HeySummon and a human provider.

Why it was flagged

The submit script sends the user's question and arbitrary message context to the HeySummon API for routing to a human provider. The artifacts do not clearly bound what context may be included or require a user approval/redaction step before external sharing.

Skill content
curl -s -X POST "${BASE_URL}/api/v1/help" ... question: process.argv[4], messages: JSON.parse(process.argv[5])
Recommendation

Require explicit user confirmation before each request, show the destination provider/platform URL, and send only minimized or redacted context.

What this means

A user may share secrets believing the conversation is end-to-end encrypted when the platform/provider may receive readable content.

Why it was flagged

This privacy claim is misleading or at least ambiguous: the provided submit script posts the question and messages as plaintext JSON fields, and the watcher explicitly handles plaintext provider messages. Users may overtrust the confidentiality of what they send.

Skill content
All communication flows through the platform API. E2E encryption is handled server-side.
Recommendation

Either implement client-side encryption for submitted content or remove/clarify the E2E claim and warn users not to send secrets.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

A bundled or leaked client key could allow unintended access to a HeySummon account or service identity.

Why it was flagged

The static scan reports this README line appears to expose a hardcoded API secret or token. That is not necessary for the stated purpose and conflicts with the documentation's claim of no hardcoded credentials.

Skill content
CLIENT_KEY="[REDACTED]"
Recommendation

Remove the literal secret, rotate the affected key, and keep only placeholders in documentation.

What this means

The background watcher can act through the user's local OpenClaw gateway to send notifications or wake the agent.

Why it was flagged

The watcher reads the local OpenClaw gateway token from ~/.openclaw/openclaw.json and uses it to invoke local OpenClaw endpoints. This high-impact local credential use is not declared in the registry metadata.

Skill content
readFileSync(p,'utf8')).gateway.auth.token ... "http://127.0.0.1:${OPENCLAW_PORT}/tools/invoke"
Recommendation

Disclose the required OpenClaw token/config path, scope the token or endpoint permissions if possible, and let users opt in before starting the watcher.

ConcernHigh Confidence
ASI08: Cascading Failures
What this means

If enabled, private keys, API keys, provider records, or request data could be pushed to GitHub.

Why it was flagged

The optional auto-sync script commits and pushes all changes in the skill directory. The same skill stores API keys, provider data, keypairs, and request tracking files locally, and no .gitignore file appears in the supplied manifest.

Skill content
git add -A ... git commit -m "Auto-sync: $TIMESTAMP" --quiet ... git push origin main --quiet
Recommendation

Do not run auto-sync until a reviewed .gitignore is present; exclude .env, providers.json, .keys, .requests, logs, and any event files.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

The skill may keep running after setup to receive and forward HeySummon events.

Why it was flagged

Setup starts a persistent background SSE watcher using pm2 or nohup. This is disclosed and purpose-aligned for receiving provider replies, and teardown.sh can stop it.

Skill content
pm2 start "$WATCHER" --name "$NAME" --interpreter bash
pm2 save
...
nohup bash "$WATCHER" >> "$LOGFILE" 2>&1 &
Recommendation

Start the watcher only when needed, confirm the notification target, and use scripts/teardown.sh when finished.

What this means

Installation and permission expectations may be unclear until the scripts are inspected.

Why it was flagged

The registry metadata under-declares what the artifacts use: README and scripts require Node.js/curl/jq, HeySummon API keys, .env configuration, and the local OpenClaw config token.

Skill content
Required binaries ... none; Required env vars: none; Primary credential: none; Required config paths: none
Recommendation

Update metadata to declare required binaries, env vars, credentials, config paths, network use, and background-process behavior.