Reliable Tool Context
Analysis
The skill is transparent about its purpose, but it depends on an unpinned external tool and tells the agent to run arbitrary commands and inline Python queries without clear approval or side-effect limits.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
sift-gateway run --json -- <command>
The required workflow wraps an arbitrary placeholder command, and the skill does not add read-only, approval, or side-effect boundaries for the command being captured.
[0] uv | package: sift-gateway | creates binaries: sift-gateway
The install spec pulls an external package/binary by name without a pinned version or hash, and the skill's behavior depends on that binary.
sift-gateway code --json <artifact_id> '$' --code "def run(data, schema, params): return ..."
The workflow executes inline Python supplied through `--code` for artifact queries, but the instructions do not state a side-effect-free review or containment requirement.
`sift-gateway code` defaults to `--scope all_related`; start with `--scope single` for anchor-only analysis and widen scope only when needed.
The documented default can include related artifacts; the guardrail reduces risk, but widening scope can propagate a mistaken or poisoned capture into broader analysis.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Create a ClawHub API token. Add repository secret `CLAWHUB_TOKEN` in GitHub
This credential is documented for an optional maintainer sync workflow rather than normal runtime use, but it is still account authority users should not confuse with installation requirements.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Capture output as an artifact ... Keep only `artifact_id` plus a short summary in prompt context ... Never paste raw captured payloads back into context.
The skill intentionally stores command output outside prompt context and references it by artifact ID; this reduces prompt exposure but still creates stored artifacts that may contain sensitive output.
