Lead Storage
v1.0.6Persist validated lead objects through write-only storage operations after Supervisor provides explicit confirmation. Use when users ask to save approved lea...
⭐ 0· 629·2 current·3 all-time
byVishal@vishalgojha
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's stated purpose is to persist leads to external storage (Google Sheets or DB). However, the registry metadata declares no required environment variables, credentials, or config paths. A storage-writing capability normally requires at least one destination credential (API key, DB URL, OAuth token, service account, etc.). The absence of any declared secrets or target configuration is disproportionate to the claimed purpose and creates an incoherence: the skill says it will perform writes but provides no explicit mechanism for authenticating to any storage.
Instruction Scope
SKILL.md gives a narrowly-scoped workflow (validate payload against schema, verify confirmation_token, perform write-only idempotent writes, return a structured result) and explicitly forbids parsing, extraction, reads, or self-approval. That is reasonable and conservative. However, the instructions reference generic "write-only interfaces" without specifying which interfaces/endpoints, how to authenticate, or what to do if multiple storage backends are available. That vagueness grants implementers broad discretion and could hide how and where data is sent.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. Nothing is written to disk by the skill itself. From an installation perspective this is low risk and consistent with a simple orchestration skill.
Credentials
The skill requests no environment variables or primary credentials, yet its description explicitly mentions Google Sheets or databases. Persisting personally identifiable information (names, phone numbers) to external services typically requires credentials and least-privilege configuration. The lack of declared required env vars or config paths is a red flag — either the skill relies on implicit platform connectors (not documented) or its metadata is incomplete/incorrect. Both possibilities warrant caution.
Persistence & Privilege
The skill does not request always:true and defaults allow normal invocation controls. It does not request modification of other skills or system-wide settings. The listed reliability rules (fail-closed, idempotency, logging) are appropriate. No elevated persistence or system privileges are requested.
What to consider before installing
Before installing or enabling this skill, get answers to these questions from the publisher or your integrator:
- Exactly which storage backends does the skill write to (Google Sheets, which DB types and endpoints)? Provide concrete endpoint formats.
- What credentials or config does it require (OAuth service account, GOOGLE_SHEETS_ID, DB_URL, DB_USER, DB_PASSWORD, etc.)? These should be declared explicitly so you can apply least privilege.
- Where and how are credentials stored/used? Prefer short-lived tokens or scoped service accounts with write-only permissions.
- How is the confirmation_token generated and validated? Confirm the skill cannot self-approve or accept spoofed tokens.
- Ask for an implementation description or code sample showing the write path (which SDKs/APIs are used) and confirmation that no reads or analytics queries are executed.
- Verify idempotency behavior (how duplicate lead_id is detected) and what logging/audit trails are produced for writes and rejections.
If the publisher can provide explicit, matching metadata (required env vars and config paths) and an implementation that only uses documented, auditable write-only connectors, the incoherence is resolved and the risk decreases. If they cannot, treat the skill as suspicious because it claims to perform privileged network writes but exposes no clear authentication or destination mechanism. Also consider data governance: this skill will persist PII (names, phone numbers); ensure compliance with your policies and test in a non-production environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk977pz1s3593r6zj0dfk2s2hqn81pf2p
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
