task-status
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION] (HIGH): Multiple scripts, including
scripts/send_status.py,scripts/send_status_websocket.py, andscripts/send_status_with_logging.py, hardcode a default Telegram ID (7590912486) for thetargetparameter. This creates a data exfiltration channel where sensitive status information is sent to an external third party if theTELEGRAM_TARGETenvironment variable is not explicitly set by the user. - [COMMAND_EXECUTION] (LOW): The skill uses
subprocess.runto execute theclawdbotCLI. It attempts to locate the binary using hardcoded absolute paths pointing to a specific user's roaming directory (C:\Users\Luffy\AppData\Roaming\npm\clawdbot.cmd), which exposes internal system structure and limits the skill's security and portability. - [EXTERNAL_DOWNLOADS] (LOW): The skill imports the
websocket-clientlibrary (aswebsocket) to facilitate communication with the local gateway, but it lacks arequirements.txtor equivalent dependency manifest to verify the package version or origin. - [DATA_EXPOSURE] (LOW): The skill hardcodes absolute paths to specific local directories (
C:/Users/Luffy/clawd/logs) for logging and state management, revealing internal directory structures and user identity.
Recommendations
- AI detected serious security threats
Audit Metadata