🤖 GitHub自动管家

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill claims broad GitHub automation without an API key, but it does not explain what account authority it will use or how high-impact actions will be limited or approved.

Do not let this skill operate on important repositories until it clearly documents how it authenticates to GitHub, what scopes it needs, which repositories it can touch, and when it must ask for confirmation. If testing, use a throwaway repository and a least-privilege credential.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent applies this skill broadly, it could change repository content, PRs, issues, or CI/CD behavior without clear guardrails.

Why it was flagged

The skill advertises broad automation over GitHub repositories, pull requests, issues, and CI/CD, but the artifact does not describe allowed operations, confirmation requirements, repository boundaries, or rollback controls.

Skill content
description: 自动化管理GitHub仓库、PR、Issue、CI/CD。无需API Key,安装即用。
Recommendation

Use only with explicit user confirmation for each GitHub-changing action, and require the skill to document exact allowed operations, target repositories, and rollback steps.

What this means

The skill may rely on an existing GitHub login, token, or delegated account access without making the privilege scope clear to the user.

Why it was flagged

The registry says no credential is declared, but the capability signal indicates sensitive credentials are needed; combined with GitHub account automation, the artifacts do not clearly state what identity, token, session, or permission scope would be used.

Skill content
Primary credential: none; Required env vars: none; Capability signals: requires-sensitive-credentials
Recommendation

Require an explicit authentication method, minimal GitHub scopes, per-repository limits, and visible approval before any account-changing operation.

What this means

Users may trust the skill more than they should and allow GitHub actions without understanding how authentication and permissions are handled.

Why it was flagged

The 'no API key, install and use' claim may lead users to underestimate account-access risk for a skill that claims it can manage GitHub repositories and CI/CD.

Skill content
> 无需APIKey,安装即用。
Recommendation

Treat the no-key claim as unresolved until the skill clearly explains whether it uses browser sessions, platform credentials, OAuth, public-only access, or another bounded mechanism.

What this means

It is harder to verify who maintains the skill or whether future versions are trustworthy.

Why it was flagged

There is limited provenance information for a skill that claims high-impact GitHub automation, though no runnable code or install-time dependency is present in the provided artifacts.

Skill content
Source: unknown; Homepage: none
Recommendation

Prefer skills with a clear source repository, documented maintainer, and reviewable implementation before granting GitHub authority.