Qr Campaign Studio

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If you process an untrusted batch file, it could create or overwrite PNG/JSON files outside the folder you chose for QR output.

Why it was flagged

The batch row name comes directly from CSV/JSON input and is joined into output paths without rejecting path separators or traversal. A crafted batch file could place generated files outside the intended output directory.

Skill content
name = (row.get('name') or f'item-{i}').strip()
out = os.path.join(args.output_dir, f'{name}.png')
meta_out = os.path.join(args.output_dir, f'{name}.meta.json')
Recommendation

Use only trusted batch files. The skill should sanitize names to safe basenames and verify resolved output paths remain inside the requested output directory.

What this means

Sensitive information encoded in a QR code may also appear in terminal output, agent logs, or metadata files, not only in the QR image itself.

Why it was flagged

The generated metadata includes a preview of the QR payload and prints it to stdout. For WiFi QR codes, that preview can include the WiFi password; for vCards, it can include personal contact details.

Skill content
return f"WIFI:T:{security};S:{ssid};P:{password};H:{str(hidden).lower()};;" ... "payload_preview": payload[:120], ... print(json.dumps(meta, ensure_ascii=False))
Recommendation

Avoid using this skill for secrets unless you can secure all outputs. The skill should redact payload previews for WiFi/vCard content or make sensitive metadata output an explicit opt-in.