Istore Build Passwall

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is purpose-aligned, but it asks for broad GitHub authority and can overwrite a repository and change GitHub Actions permissions.

Review carefully before installing. Only use this with a disposable or backed-up fork, prefer a fine-grained GitHub token limited to that repository, revoke the token afterward, and inspect the generated GitHub Actions workflow and downloaded package sources before running the resulting router installer.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistake or misunderstanding could overwrite the target GitHub repository and grant workflows broader write capabilities.

Why it was flagged

The skill instructs the agent to force-push to the user's repository, explicitly overwriting existing content, and to change repository Actions permissions. These are high-impact actions and the artifact does not show a safer branch/PR path, backup, rollback, or explicit second confirmation.

Skill content
提交并强制推送到用户的仓库(覆盖原有内容) ... git push -u origin main --force ... 设置 Workflow permissions
Recommendation

Use a dedicated test fork first, avoid force-push by default, create a branch/PR instead, back up the repository, and require explicit user confirmation before changing repository permissions.

What this means

The token may allow access to more repositories than this one task needs, and mishandling it could expose account-level repository access.

Why it was flagged

The skill asks for a classic GitHub token with broad repo permission and embeds it in a Git remote URL, which can leave the token in local Git configuration or logs unless carefully cleaned up.

Skill content
Personal Access Token(需开启 `repo` 权限) ... git remote set-url origin https://<TOKEN>@github.com/<USER>/istoreos.git
Recommendation

Use a fine-grained token limited to the target fork with only the required permissions, avoid putting tokens directly in remote URLs, remove any stored credentials after use, and revoke the token when finished.

What this means

The resulting router installer may include whatever packages those remote sources provide at build time, so an upstream compromise or changed release could affect the generated artifact.

Why it was flagged

The generated workflow downloads latest release assets and SourceForge packages into the build without visible hash, signature, or pinned artifact verification in the provided content.

Skill content
PW2_LATEST=$(curl_gh "https://api.github.com/repos/Openwrt-Passwall/openwrt-passwall2/releases/latest" ...); SF_BASE="https://sourceforge.net/projects/openwrt-passwall-build/files/releases/packages-22.03"; curl -fL "$url" -o "$dest"
Recommendation

Pin exact versions, verify checksums or signatures, document all third-party package sources, and review the workflow before running the generated installer on a router.