Mission Claw
Analysis
Mission Claw is a coherent activity-logging skill that may persist task metadata through an external local CLI, but the provided artifacts do not show deceptive, destructive, or credential-stealing behavior.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
binaries: [mclaw] install: npm install -g mission-claw
The skill depends on a globally installed npm CLI that is not included in the reviewed artifact set. This is expected for a CLI-based logging skill, but users must trust the external package.
mclaw log "Task description" ... --total-tokens N
The core workflow asks the agent to run a local CLI command that writes activity records. This is purpose-aligned, but it is still a tool-mediated write action.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Log significant tasks to the Mission Claw activity feed for tracking agent work, token usage, and project progress.
The activity feed persists task names, project names, token usage, and optional details. This is central to the skill, but those fields may contain sensitive work context if users include it.
