Billclaw
Analysis
BillClaw’s purpose is coherent, but it handles bank and Gmail credentials through unpinned external npm packages, so it should be reviewed carefully before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
package: @firela/billclaw-openclaw ... package: @firela/billclaw-cli ... package: @firela/billclaw-connect
The install specification references external npm packages without exact versions. Those packages provide the actual financial/Gmail integration behavior.
All npm packages are: ... Version-pinned for reproducibility
This assurance conflicts with the unversioned package names in the install specification, which could lead users to place more trust in the install path than the artifacts support.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`PLAID_SECRET` | Plaid API secret | Plaid bank sync ... `GMAIL_CLIENT_SECRET` | Gmail OAuth client secret | Gmail bill fetching
The skill documents credentials that can enable access to bank transaction data and Gmail bill data. This is purpose-aligned, but it is high-impact authority and is not reflected in the registry credential or capability declarations.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Financial data stored locally in `~/.firela/billclaw/` ... OAuth tokens stored in your system keychain
The skill persists sensitive financial data locally and stores OAuth tokens in the system keychain. This is disclosed and purpose-aligned, but it creates a sensitive local data footprint.
