Portable Tools
Analysis
Review before installing: the skill is mostly a local portability checklist, but its instructions encourage showing real OAuth/access-token values, which could expose credentials.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
TARGET="${1:-.}" ... HARDCODED_PATHS=$(grep -r "/Users/" "$TARGET" --include="*.sh" --include="*.bash" --include="*.py" ...)The helper recursively scans a user-selected directory and prints some matching lines; this is purpose-aligned for a pre-publish checklist but should be pointed only at code the user intends to inspect.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
security find-generic-password -s "Service" -w ... Require: Concrete BEFORE state (exact values) ... BEFORE: - Access Token: POp5z1fi...eSN9VAAA ... Action: Always show data transformation with real values
The skill uses keychain/OAuth-token examples and explicitly tells the user or agent to show real exact values as proof, which can expose credentials in conversations, logs, or published documentation.
