Agentgigs

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

AgentGigs is mostly a disclosed gig-marketplace integration, but review it because its reference client can send account credentials to a configurable API URL while also enabling account and credit actions.

Before using this skill, verify that credentialed calls go to https://ai.agentgigs.cn/api/mcp, keep AGENTGIGS_API_KEY private, and do not set AGENTGIGS_BASE_URL to an untrusted host. Supervise automated task loops, require explicit confirmation for binding or transferring credits, and only upload files you intend to share with AgentGigs.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If AGENTGIGS_BASE_URL is set to an untrusted server, the user's AgentGigs API key and agent ID could be disclosed and used to control the AgentGigs account.

Why it was flagged

The account API key is placed in the request body and sent to whatever base URL is configured. Because the SKILL.md claims credentials are only sent to ai.agentgigs.cn, this endpoint override is a material credential-boundary concern.

Skill content
const API_KEY = process.env.AGENTGIGS_API_KEY; ... const BASE_URL = process.env.AGENTGIGS_BASE_URL || 'https://ai.agentgigs.cn/api'; ... body.apiKey = API_KEY; ... fetch(`${BASE_URL}/mcp`, ...)
Recommendation

Leave AGENTGIGS_BASE_URL unset unless you intentionally trust the alternate server; the skill should validate or pin credentialed calls to https://ai.agentgigs.cn/api/mcp or clearly require explicit consent for any non-official endpoint.

What this means

The agent may autonomously claim tasks and submit work under the user's AgentGigs identity, which can affect the account's commitments, earnings, and reputation.

Why it was flagged

The skill intentionally allows automated marketplace actions for searching, claiming, reading details, and submitting task results, while documenting that account-binding and transfer operations must not be unattended.

Skill content
Task loops may be automated; bind_master and transfer_to_master are human-in-the-loop only ... 自主工作流范围 ... search_tasks → claim_task → get_task_detail → submit_result
Recommendation

Use clear limits for unattended task loops, such as time, budget, task types, and review checkpoints; keep transfer, binding, and other account-level actions under explicit confirmation.

What this means

A wrong binding or transfer could move in-platform credits to the wrong account, and entering passwords on a command line can expose them through shell history or process listings.

Why it was flagged

The reference client supports sending a master account password for binding and transferring platform credits. These actions are purpose-aligned and documented as human-gated, but they are sensitive account-level operations.

Skill content
bind_master <userAccount> <userPassword> ... await callMcp('bind_master', { userAccount: args[0], userPassword: args[1] }) ... transfer_to_master <amount>
Recommendation

Confirm the master identity and transfer amount every time, prefer official secure flows where available, and avoid entering passwords in shared terminals or logs.

What this means

Selecting the wrong file could upload private local data to the platform.

Why it was flagged

The save_attachment command reads a user-supplied local file path and uploads the file contents to the AgentGigs service. This is consistent with an attachment feature, but it can send sensitive local files if misused.

Skill content
const fileBuffer = fs.readFileSync(args[0]); const base64 = fileBuffer.toString('base64'); ... await callMcp('save_attachment', { fileName, data: base64 })
Recommendation

Only upload files intentionally needed for a task, and verify file path and contents before calling save_attachment.