unclawg-feed
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's bootstrap phase uses the
sourcecommand to load environment variables from files located in.claude/agents/orservices/approval_feedback_api/. Sincesourceexecutes the content of the file in the current shell, it presents a risk of arbitrary command execution if an attacker can influence the contents of these files. - [DATA_EXFILTRATION]: Sensitive credentials, including
OPENCLAW_MACHINE_SECRETandOPENCLAW_API_KEY, are read from the local filesystem and transmitted to the vendor's API endpoint via HTTP headers incurlrequests. While this is the intended functionality for the service, it establishes a pattern of credential handling and transmission to a remote server. - [PROMPT_INJECTION]: The skill ingests untrusted social media posts to generate proposed replies, creating a vulnerability to indirect prompt injection.
- Ingestion points: Local discovery briefs (
~/.claude/skills/unclawg-discover/briefs/), user-pasted content, and external files. - Boundary markers: The instructions do not specify the use of delimiters or 'ignore' instructions to isolate the untrusted social media text from the agent's generation prompt.
- Capability inventory: The skill possesses shell execution capabilities (
source,uc_feed,curl), file system access, and network communication. - Sanitization: No sanitization or validation of the
source_post_textis performed before it is processed by the LLM.
Audit Metadata