Dida365 Openapi

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a coherent Dida365 task-management integration, but it gives an authorized agent read/write control over tasks and projects and caches OAuth credentials locally.

This skill is reasonable to install if you want an agent to manage your Dida365 tasks. Before using it, verify OAuth/base URL settings, protect the local token/config files, and require explicit confirmation for deletes, moves, or other bulk account changes.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If authorized, the agent can make meaningful changes to your Dida365 account, including moving or deleting tasks/projects.

Why it was flagged

The documented API surface includes creating, updating, moving, completing, and deleting Dida365 projects/tasks. This is aligned with the skill purpose, but it is account-changing authority.

Skill content
`POST /open/v1/project` ... `DELETE /open/v1/project/{projectId}` ... `POST /open/v1/task/move` ... `DELETE /open/v1/project/{projectId}/task/{taskId}`
Recommendation

Install only if you want the agent to manage Dida365 data, and ask it to confirm destructive or bulk actions such as delete, move, or project updates.

What this means

Anyone or any process that can read these local files may be able to reuse credentials or tokens to access task data.

Why it was flagged

The skill persistently stores OAuth app credentials and token responses locally so later API calls can access the user's Dida365 account.

Skill content
`config.json`: stores resolved auth settings such as `client_id`, `client_secret`... `token.json`: stores the raw token response from Dida365.
Recommendation

Protect the local config directory, avoid sharing logs or files from it, use `auth clear-token` when access is no longer needed, and rotate credentials if exposed.

What this means

A mistaken or maliciously set base URL could route OAuth secrets, bearer tokens, or task content to a non-Dida365 endpoint.

Why it was flagged

The defaults point to Dida365, but CLI/env/config overrides can change the OAuth and API destinations that receive credentials and task data.

Skill content
DEFAULT_AUTH_BASE_URL = "https://dida365.com" ... DEFAULT_API_BASE_URL = "https://api.dida365.com" ... "auth_base_url": "DIDA365_AUTH_BASE_URL", "api_base_url": "DIDA365_API_BASE_URL"
Recommendation

Leave auth/API base URLs at their defaults unless you intentionally use a trusted test or proxy endpoint, and check environment variables before authenticating.

What this means

You have less registry-level context for verifying the publisher or upstream repository.

Why it was flagged

The registry metadata does not provide a source URL or homepage, which reduces provenance clarity even though the supplied artifacts include bundled code.

Skill content
Source: unknown; Homepage: none
Recommendation

Review the bundled files and, if provenance matters, independently verify the referenced project/repository before relying on the skill.