zenzap-onboarding
Analysis
The skill matches its Zenzap onboarding purpose, but it asks the agent to install an external plugin, handle new API credentials, load remote API instructions, and keep operating inside the workspace with broad ongoing authority.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
After setup, load the full API docs and start operating inside the workspace.
This expands the workflow beyond the single onboarding call into broader authenticated workspace operations, without clearly limiting which actions require user approval.
openclaw plugins install @zenzap-co/openclaw-plugin
The skill asks the human to install external plugin code that is not present in the reviewed artifact set. The step is disclosed and user-directed, but its version and implementation are not reviewed here.
Start polling **before** telling the human to join so you don't miss their first message: GET https://api.zenzap.co/v2/updates?timeout=30
The workflow starts ongoing event polling for the bot, but the visible instructions do not define when polling should stop or how the user can constrain ongoing bot activity.
`humanEmail` | string | Required. Valid email.
The API requires a human email, but the earlier visible collection list says to ask four questions and does not include email, which could make consent for sending that personal data less explicit.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`credentials` | **API Key** for Bearer auth, **API Secret** for HMAC-SHA256 signing (store securely)
The skill obtains and uses bot API credentials. This is expected for the Zenzap integration, but those credentials grant delegated access to the new workspace.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Immediately after receiving the 201, load the complete Zenzap API reference: https://docs.zenzap.co/llms-full.txt
The agent is instructed to retrieve remote, mutable documentation and use it as context for later authenticated operations.
