auto-researcher
Analysis
The skill mostly matches its research-assistant purpose, but its shell scripts unsafely insert the requested research topic into Python code, which could let a crafted topic run local code.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
TOPIC="$1" ... python3 << PYTHON_SCRIPT ... topic = "$TOPIC"
The user-provided research topic is expanded directly into Python source inside an unquoted here-document. A topic containing quotes or newlines could alter the Python program that is executed.
TOPIC="$1" ... python3 << PYTHON_SCRIPT ... topic = "$TOPIC"
The enhanced shell script repeats the same unsafe pattern: user-controlled topic text is injected into inline Python code before execution.
if command -v xreach ... curl -s ... if command -v gh ... python3 << PYTHON_SCRIPT
The script depends on external local tools, while the registry declares no required binaries and provides no install spec. This is purpose-aligned, but the setup requirements are not fully declared.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
'jina_api': 'https://r.jina.ai/' ... url = f"{CONFIG['jina_api']}https://duckduckgo.com/html/?q={encoded}"Some searches are routed through the third-party r.jina.ai gateway. This is aligned with the research purpose, but it means the user's research terms are shared with that provider.
