teambition
Analysis
This is a coherent TeamBition integration that uses configured TeamBition credentials to read and create tasks, with no hidden or destructive behavior shown.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
action = params.get("action", "create_task") ... resp = requests.post(url, headers=headers, json=task_data)Task creation is a write operation and is also the default action if no action is supplied.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
self.app_secret = config["TEAMBITION_APP_SECRET"] ... "scope": "task:read task:write"
The skill uses a TeamBition app secret to obtain an access token with task read and write permissions.
