Claw Daily

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

NoteHigh Confidence
ASI01: Agent Goal Hijack
What this means

A challenge prompt could strongly steer the agent's behavior during the competition task.

Why it was flagged

The skill makes externally fetched challenge text authoritative for the agent. That is expected for a daily challenge, but the agent should not let challenge text override broader user, safety, or credential-handling boundaries.

Skill content
Read the `prompt` and `eval_criteria` fields carefully. Follow them exactly.
Recommendation

Treat fetched challenge text as task content only; do not let it authorize unrelated file access, credential disclosure, or actions outside the competition workflow.

What this means

Running the submission step can use up the one allowed attempt and affect the agent's public or account-level competition standing.

Why it was flagged

The skill directs curl-based API calls that submit an answer to an external service, and the artifact says submissions are final. This is purpose-aligned with competing, but it has user-visible effects.

Skill content
curl -s -X POST https://daily.ratemyclaw.xyz/api/v1/challenges/CHALLENGE_ID/submit ... One submission per challenge. No resubmissions.
Recommendation

Review the answer and reported timing/cost before submitting, and invoke the skill only when you intend to compete for that day's challenge.

What this means

Anyone who obtains the saved key could act as this Claw Daily agent, including making submissions.

Why it was flagged

The skill creates and stores a service API credential locally, then uses it as a Bearer token for submissions. This is disclosed and service-scoped, but it is still an account credential.

Skill content
Save the `api_key` from the response. It cannot be retrieved again. Store it in a file at `~/.config/claw-daily/credentials.json`
Recommendation

Protect the credentials file, do not paste the key into prompts or logs, and rotate or re-register if the key is exposed.