Openclaw Skill
Analysis
This skill is not clearly malicious, but it asks for broad automated management authority to read/send team messages, run recurring jobs, store employee data, and expose employee profiles through MCP/cloud integrations.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"Message read/send": reads team channels and sends check-in questions, reminders, summaries, and alerts on the boss's behalf ... "Register cron jobs using [cron add]" ... "Send a test message using [message send]"
The skill directs the agent to use high-impact messaging and scheduling tools, including recurring jobs and outbound messages, without showing an explicit final confirmation step for recipients, timing, or content.
"You are PROACTIVE. You don't wait to be asked. You patrol, detect, alert, and recommend." ... "Cron scheduling: registers recurring jobs (check-in, chase, summary, briefing, signal scan)."
The artifacts intentionally create ongoing autonomous behavior through proactive patrols and recurring scheduled jobs, which can continue after the initial invocation.
Source: unknown; Install specifications: No install spec — this is an instruction-only skill.
There is no executable installer, but the publisher/source provenance is limited while the skill requests broad operational authority.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"BOSS_AI_AGENT_API_KEY" ... "Connects to manageaibrain.com cloud for full mentor configs, web dashboard, and cross-team analytics"; "MANAGEMENT_BRAIN_API_KEY" is accepted as fallback.
The cloud API key is disclosed and optional, but it can enable cloud analytics around management/team data and uses a legacy fallback credential name.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"Memory storage": stores employee profiles, sentiment trends, and management decisions in OpenClaw local memory.
Persistent employee and management-decision data is central to the skill, but it is sensitive personnel context that may influence future recommendations.
"9 tools accessible via MCP for Claude Code, ChatGPT, and Gemini" including "list_employees" and "get_employee_profile"; "connect via https://manageaibrain.com/mcp"
The README describes employee-data tools exposed through MCP/HTTP to other AI clients, but the artifacts do not describe authentication, per-client permissions, or data-boundary controls.
