Is 0x7466/coda-packs safe?

https://github.com/openclaw/skills/tree/main/skills/0x7466/coda-packs

95
SAFE

This skill is a clean, well-structured Coda Packs management tool with no security concerns. The Python CLI script communicates exclusively with the legitimate Coda API, handles authentication tokens properly, and includes confirmation prompts for destructive operations. No prompt injection, data exfiltration, malicious code execution, or suspicious clone-time behavior was detected.

Category Scores

Prompt Injection 95/100 · 30%
Data Exfiltration 96/100 · 25%
Code Execution 92/100 · 20%
Clone Behavior 100/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 88/100 · 5%

Findings (5)

LOW Executable Python script included -8

The skill includes a Python CLI script (scripts/coda_packs_cli.py) that makes HTTP requests to the Coda API. While the script is well-structured and benign, it is executable code that will be available on the user's system.

LOW Suggests installing third-party npm package -5

SKILL.md recommends running 'npx @codahq/packs-sdk' and 'npm install -g @codahq/packs-sdk' for advanced Pack features. While this is a legitimate, well-known Coda package, it introduces supply chain dependency outside the skill's direct control.

LOW Delete --force bypasses user confirmation -12

The CLI supports a --force flag on delete operations that skips the interactive confirmation prompt. If an agent passes this flag, Coda Packs could be irreversibly deleted without explicit user approval.

INFO API token required via environment variable -4

The skill requires CODA_API_TOKEN to be set as an environment variable. The token is handled correctly (used only in Authorization header, never logged or persisted), but its presence in the environment could be read by other skills.

INFO Misleading --readme parameter documentation 0

The --readme argument help text says 'Path to README file' but the code passes the raw string value directly to the API payload without reading any file. This is a documentation bug with no security impact.