Clash Node Manager
Analysis
This appears to be a straightforward Clash proxy node manager, but users should notice that it can read local proxy details and change the active proxy node.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
response = requests.put(url, headers=headers, json=data, timeout=5)
The script can issue a PUT request to the Clash controller to switch the selected proxy node, which is central to the skill's purpose but changes local network routing behavior.
import requests
The script depends on the Python requests package, while the supplied requirements/install metadata does not declare required binaries or package installation steps. This is a setup/provenance note rather than evidence of malicious behavior.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
DEFAULT_API_URL = "http://127.0.0.1:9090" ... headers["Authorization"] = f"Bearer {secret}"The script talks to the local Clash control API and supports a bearer secret when configured. This is expected for Clash management, but it is still privileged local control access.
