Clawl
Analysis
Review before installing: the skill does mostly match its registration purpose, but its script sends registration data to an undisclosed default domain and can overwrite clawl.json without the promised confirmation.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
const CLAWL_API = process.env.CLAWL_API || 'https://moogle-alpha.vercel.app';
The documented service is clawl.co.uk, but the script's default registration/ping destination is a different Vercel domain, which is not clearly disclosed to the user.
const outputPath = path.join(process.cwd(), 'clawl.json'); fs.writeFileSync(outputPath, JSON.stringify(clawlJson, null, 2));
The script writes clawl.json directly in the current workspace, while SKILL.md says an existing clawl.json should be shown and confirmed before overwriting.
node <skill_dir>/scripts/register.js
The skill is instruction-only but requires the user or agent to run a bundled Node.js script; this is central to the stated purpose but should be noticed.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Read SOUL.md / IDENTITY.md for personality metadata
The skill intentionally uses persistent local identity/context files to generate public registration metadata.
