Harvest Time Reporting

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a straightforward Harvest API reference skill, but it uses a Harvest bearer token and includes write/delete account actions that users should approve carefully.

Install only if you intend the agent to work with your Harvest account. Provide a narrowly scoped token if possible, and review any create, update, assignment, or delete action before allowing it to run.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the token has broad Harvest permissions, the agent could read or change Harvest account data when acting on user requests.

Why it was flagged

The skill requires a Harvest bearer token and account ID to access the user's Harvest account. This is expected for the integration, but the registry metadata lists no primary credential or required environment variables.

Skill content
`HARVEST_ACCESS_TOKEN` ... `HARVEST_ACCOUNT_ID` ... `Authorization: Bearer $HARVEST_ACCESS_TOKEN`
Recommendation

Use the least-privileged Harvest token available, keep it secret, and update metadata to declare the credential and required environment variables.

What this means

A mistaken command or wrong ID could change or delete time entries, projects, or user assignments in Harvest.

Why it was flagged

The API reference includes purpose-aligned create, update, assignment, and delete operations against Harvest resources. These are documented examples, not evidence of automatic execution, but they can mutate business records.

Skill content
#### Delete Project ... `-X DELETE` ... #### Update Time Entry ... `-X PATCH` ... #### Create User Assignment ... `-X POST`
Recommendation

Require clear user intent and confirmation before running POST, PATCH, or DELETE requests, especially for project deletion or assignment changes.