Clerk Auth
Analysis
The Clerk guidance is mostly purpose-aligned, but its companion setup agent can read and print local Clerk secrets and run/write setup commands, so it needs review before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
description: Clerk authentication setup specialist. MUST BE USED when configuring Clerk, setting up webhooks, or troubleshooting auth issues. Use PROACTIVELY for new auth implementations. tools: Read, Write, Edit, Bash, Grep, Glob, WebFetch
The companion agent is instructed to run proactively and has broad file-editing and shell authority. That authority is relevant to setup, but the artifacts do not clearly require user approval, diffs, backups, or command-by-command confirmation before modifying a project.
cat > .env.local << 'EOF' CLERK_PUBLISHABLE_KEY=pk_test_... CLERK_SECRET_KEY=sk_test_... EOF
The setup workflow demonstrates overwriting `.env.local` with placeholder Clerk values. In an automated setup workflow, this could clobber existing environment configuration or replace real settings without a backup.
npm install @clerk/nextjs@latest npm install @clerk/backend@latest npm install @clerk/clerk-react@latest
Installing Clerk packages is expected for this skill, but using `@latest` means the installed code can change over time and may not match the documented tested versions.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
grep -r "CLERK" .env* 2>/dev/null || echo "No .env files found" ... grep CLERK .env* .dev.vars 2>/dev/null
These commands inspect local environment files and can print Clerk secret keys or webhook secrets into the agent/session output. Clerk secret keys can authorize Backend API actions, so unredacted reading/output is high-impact credential handling.
