Naver Blog Publisher
Analysis
This skill is review-worthy because it can publish paid public Naver Blog posts using a local logged-in browser session while installing an unpinned local runner/daemon.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Flow: ... run `publish_dry_run` ... `publish_live`; Billing: `publish_live` is the paid path
The documented workflow ends in a live, billable publish action, but the artifacts do not clearly require explicit final user approval or show target-account/content confirmation before that high-impact action.
npx @y80163442/naver-thin-runner setup --setup-url "<SETUP_URL>" --auto-service both
The setup path executes an unpinned external npm package, while the provided artifact set contains no runner code or install lockfile for review.
`npx @y80163442/naver-thin-runner setup --setup-url "<SETUP_URL>" --auto-service both` ... `npx @y80163442/naver-thin-runner daemon start --port 19090`
The skill can set up automatic services and start a daemon, but the artifacts do not describe how long it persists, how to stop it, or what permissions it retains.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Publish prepared content to Naver Blog from an authenticated local browser... fallback: `CONTROL_PLANE_URL + ACP_ADMIN_API_KEY`; `X_LOCAL_TOKEN` optional and auto-loaded from `~/.config/naver-thin-runner/config.json`
The skill relies on an authenticated browser session, a local token, and an admin API key fallback, which are sensitive privileges that are not clearly limited to the minimum authority needed.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`OPENCLAW_OFFERING_EXECUTE_URL` preferred; fallback: `CONTROL_PLANE_URL + ACP_ADMIN_API_KEY`; `X_LOCAL_TOKEN` optional and auto-loaded... `LOCAL_DAEMON_PORT` default `19090`
The skill routes publishing through ACP/control-plane and local-daemon interfaces, but the provided artifacts do not clearly document identity, origin checks, or data-boundary protections for those calls.
