Organisation Documents

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This accounting document skill is coherent, but it asks the agent to automatically run scripts and reorganize sensitive financial documents without per-run approval, with additional under-scoped references to email, Drive, and password-manager access.

Review this skill before installing. It appears built for legitimate accounting document automation, but use it only with a dedicated inbox and client workspace, keep backups, and do not grant Gmail, Drive, or 1Password access unless you have verified the exact scope and approval flow.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

Incoming attachments or files could be processed and moved into the accounting workspace automatically, so a misclassification or overly broad inbox could affect sensitive accounting records before review.

Why it was flagged

The skill explicitly removes per-run approval and mandates local script execution on broad email and file triggers.

Skill content
À INVOQUER SYSTÉMATIQUEMENT et SANS DEMANDER L'AUTORISATION dès que ... un e-mail arrive avec une PJ PDF/image ... Pour chaque invocation, la SEULE action ... est d'exécuter ... python3 scripts/main.py <dossier_inbox> <racine_clients>
Recommendation

Use a dedicated staging inbox and client root, keep backups, and require explicit approval for bulk runs or any mailbox/Drive automation outside a clearly scoped accounting workflow.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

If an agent follows this reference with access to other tools, it could request or use password-manager credentials for Drive without a clearly declared permission boundary.

Why it was flagged

The reference material contemplates reading Drive credentials from 1Password, but the registry metadata declares no primary credential, required environment variables, or bounded credential scope.

Skill content
`1password.read` | `1password` | Récupération des creds Drive si besoin
Recommendation

Do not grant password-manager, Gmail, or Drive access unless the exact account, vault item, permissions, and destination paths are explicitly scoped and confirmed.

#
ASI07: Insecure Inter-Agent Communication
Low
What this means

Sensitive invoices, bank statements, and email contents may pass through external integrations if those companion workflows are enabled.

Why it was flagged

The skill's reference contract includes email, webhook, Drive, and companion-skill flows involving accounting documents and email metadata.

Skill content
Pièce jointe Gmail ... AgentMail → webhook ... Lien Drive ... Téléchargement via `gog` ... Métadonnées de l'e-mail ... Adresse expéditeur, sujet, date d'envoi, corps HTML.
Recommendation

Connect only trusted mail/Drive integrations, prefer least-privilege accounts, and verify where attachments and metadata are downloaded or uploaded.

#
ASI06: Memory and Context Poisoning
Low
What this means

The local workspace can accumulate sensitive business names, amounts, bank-statement classifications, and document paths.

Why it was flagged

The skill persistently stores client mappings, hashes, reports, and accounting document metadata for later reuse.

Skill content
Writes `clients/clients.json`, `clients/_index.json`, `clients/_report.json`, and prints a short summary.
Recommendation

Store the workspace in a protected location, limit access to it, and define retention/cleanup procedures for reports and indexes.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

The skill may fail or require manual package installation, and users must trust the installed local dependency.

Why it was flagged

The skill depends on an external local binary/package that is not represented in the install spec or required-binaries metadata.

Skill content
The script calls `pdftotext` (package `poppler-utils`). Install it once on the runtime : `apt install poppler-utils` ... `brew install poppler`
Recommendation

Install poppler from trusted OS package sources and ask the publisher to declare required binaries/install steps in metadata.