XCrawl

Security checks across static analysis, malware telemetry, and agentic risk

Overview

XCrawl is a coherent instruction-only integration for calling XCrawl’s scraping API, but users should protect the API key, review optional cookies/headers/webhooks, and treat scraped output as untrusted.

Before installing, verify you trust the XCrawl service and account dashboard, store the API key carefully, and only provide URLs, cookies, headers, or webhooks that you are comfortable sending to XCrawl. The supplied SKILL.md excerpt was truncated, so this review is based on the visible artifacts only.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If authorized, the agent can run curl/node commands for XCrawl requests and has tools that could read or edit local files if used outside the documented workflow.

Why it was flagged

The skill grants command execution through curl/node and also file tools. This is largely consistent with an instruction-only API integration, but the file tools are broader than the core scrape call.

Skill content
allowed-tools: Bash(curl:*) Bash(node:*) Read Write Edit Grep
Recommendation

Approve only XCrawl-related commands and keep any file reads/writes limited to the intended config or user-requested output.

What this means

Requests made through the skill can consume XCrawl credits and act under the user's XCrawl API key.

Why it was flagged

The skill uses a local XCrawl API key to authenticate requests. This is expected for the service, but it gives the agent access to the user's XCrawl account quota.

Skill content
Path: `~/.xcrawl/config.json` ... `"XCRAWL_API_KEY": "<your_api_key>"` ... `Authorization: Bearer <XCRAWL_API_KEY>`
Recommendation

Store the key securely, use the least-privileged or revocable key available, and monitor XCrawl credit usage.

What this means

Supplying login cookies, authorization headers, or a webhook could expose private page access or scraped results to XCrawl and/or the webhook destination.

Why it was flagged

The documented API options allow user-supplied cookies, headers, and webhooks to be included in XCrawl requests. These can carry sensitive session data or route results to another endpoint if the user chooses to use them.

Skill content
`cookies` | object map ... `headers` | object map ... `webhook` | object | ... Async webhook config
Recommendation

Avoid sending session cookies or authorization headers unless necessary, confirm webhook destinations, and do not scrape private account pages unless you understand the data-sharing implications.

What this means

A malicious webpage could include text that tries to influence the agent if the scraped response is later summarized or acted on.

Why it was flagged

Raw scraped web content can contain untrusted instructions or misleading text. The skill does not appear to make that text authoritative, but downstream agents should treat it as data.

Skill content
Default behavior is raw passthrough: return upstream API response bodies as-is.
Recommendation

Treat scraped page content as untrusted input and do not follow instructions found inside retrieved webpages unless the user explicitly asks.