Plane.so

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: plane Version: 1.0.0 The skill is classified as suspicious due to its installation method, which involves downloading and executing an external script (`plane`) from a raw GitHub URL (`https://raw.githubusercontent.com/JinkoLLC/plane-skill/main/scripts/plane`) via `curl` and `chmod +x` as specified in `SKILL.md`. This introduces a supply chain risk, as the content of the downloaded script is not part of the skill bundle and could be altered remotely without a version change, potentially leading to arbitrary code execution. While the provided files do not contain explicit malicious intent or prompt injection attempts, this remote execution capability is a significant security risk.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the downloaded CLI changes upstream or is compromised, it would run locally and use the user's Plane credentials.

Why it was flagged

The skill asks the user to install an executable script from a moving GitHub raw URL; the actual script was not included in the reviewed artifacts, so its contents and provenance cannot be verified here.

Skill content
curl -o ~/.local/bin/plane https://raw.githubusercontent.com/JinkoLLC/plane-skill/main/scripts/plane
chmod +x ~/.local/bin/plane
Recommendation

Review the script before installing, prefer a pinned release or checksum if available, and only install from a trusted source.

What this means

The CLI can act as the authenticated Plane user within the configured workspace, depending on the token's permissions.

Why it was flagged

The integration uses a Plane personal access token and workspace slug, which is expected for Plane access but grants account/workspace authority to the CLI.

Skill content
export PLANE_API_KEY="your-api-key"
export PLANE_WORKSPACE="your-workspace-slug"
Recommendation

Use the least-privileged token available, avoid sharing the token, and revoke it if the CLI or machine is no longer trusted.

What this means

Mistaken or overly broad commands could change or remove project work items.

Why it was flagged

The documented CLI operations can modify assignments, update issue state/priority, and delete issues in Plane. This matches the stated project-management purpose, but these are high-impact workspace actions.

Skill content
plane issues update -p PROJECT_ID ISSUE_ID --state STATE_ID --priority medium
plane issues assign -p PROJECT_ID ISSUE_ID USER_ID_1 USER_ID_2
plane issues delete -p PROJECT_ID ISSUE_ID
Recommendation

Confirm project IDs, issue IDs, and destructive actions before running mutation commands, especially deletes or assignment changes.