Web Search Pro
Analysis
This appears to be a legitimate web-search tool, but it will contact search providers, use any API keys you configure, and keep a local cache.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Source: unknown; Homepage: https://github.com/Zjianru/web-search-pro
The package is code-backed but the registry source field is not populated, so users should verify package provenance even though the artifacts do not show a remote installer.
content: entry.content
Fetched webpage text is returned in results, which means arbitrary web content can enter the agent's context.
crawl.mjs "url1" ["url2" ...] ... --depth <n> ... --max-pages <n> ... --no-same-origin
The skill exposes a crawler for user-supplied URLs, including optional cross-origin discovery; this is expected for the purpose and documented with limits.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Optional provider credentials or endpoints widen coverage... TAVILY_API_KEY... EXA_API_KEY... PERPLEXITY_API_KEY... OPENROUTER_API_KEY
The skill can use provider API keys and gateway endpoints to authenticate outbound search/retrieval calls.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
local state directory: `.cache/web-search-pro`
The artifacts disclose local state/caching, which can persist search queries, URLs, and retrieved content for reuse.
