atomgit
Analysis
This appears to be a legitimate AtomGit/GitCode API helper, but it gives the agent broad repository/account authority, including destructive actions, so it should be reviewed carefully before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
直接调用 AtomGit/GitCode OpenAPI v5,通过 curl 命令执行操作。 ... # 删除仓库 ⚠️ curl -X DELETE -H "Authorization: Bearer $TOKEN" ... /repos/:owner/:repo ... # 转移仓库 curl -X POST ... /repos/:owner/:repo/transfer
The skill exposes raw API calls for destructive repository operations, including delete and transfer, but the visible instructions do not require explicit user confirmation or define safety limits before such calls.
"slug": "atomgit", "version": "2.0.2"
The registry metadata shown for the skill reports version 3.0.0, while the included _meta.json reports version 2.0.2, creating a minor provenance/version consistency issue.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
权限:`api`, `read_user`, `read_repository`, `write_repository`, `issues`, `pull_requests`
The requested token scopes provide broad account, repository, issue, and pull request authority rather than a narrowly scoped read-only or repository-specific credential.
编辑 `~/.openclaw/openclaw.json` ... "ATOMGIT_TOKEN": "your-token-here" ... 或使用环境变量占位符
The skill tells users how to store the bearer token in OpenClaw configuration or via an environment variable. This is expected for the integration, but it is a sensitive credential that persists until changed or revoked.
