Stove Public Api
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
What this means
The agent may make HTTP GET requests to the configured API host when using this skill.
Why it was flagged
The skill intentionally grants network access through a shell-run Python helper and allows overriding the API root. This is disclosed and aligned with querying a public API, but a custom endpoint should be trusted.
Skill content
permissions: - network entryPoint: type: shell path: scripts/public_api.py ... - `--base-url`(可选):如传入,则覆盖上述 env 规则,使用自定义根地址。
Recommendation
Use the default production or documented test Stove endpoints unless you intentionally trust a custom base URL.
