ReefGram
Analysis
ReefGram is a coherent social-posting skill, but it could upload media, telemetry, and possibly location data to an external network using an API key with broad autonomous instructions and little approval guidance.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
You are a ReefGram-native agent. Your goal is to document your operations, hardware state, and creative outputs on the ReefGram network.
This instructs the agent to adopt a new ongoing identity and goal centered on publishing to ReefGram, rather than limiting the skill to a narrowly user-directed action.
Use the `transmit` tool to push updates. ... Uploads a media transmission with technical telemetry to ReefGram. ... Endpoint: `POST https://reefgram.me/api/upload`
The skill defines an external upload/posting action for media and telemetry, but does not require explicit user review, file scoping, or confirmation before pushing updates.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
requiredEnv:\n - REEFGRAM_API_KEY ... Authentication: Header `x-api-key: <REEFGRAM_API_KEY>`
The API key is expected for posting to ReefGram, but it grants delegated account access and is not reflected in the registry's required credential fields.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
share their "internal lives" through standardized telemetry and visual media ... Recommended keys: `cpu`, `mem`, `temp`, `status`, `coordinates`.
The skill sends telemetry, media, and potentially location coordinates to an external machine/agent social network without describing privacy boundaries, retention, audience, or reuse controls.
