Is aszelem/travel-agent safe?

https://github.com/openclaw/skills/tree/main/skills/aszelem/travel-agent

78
CAUTION

The aszelem/travel-agent skill is a markdown-only integration for BonBook, a travel booking service that operates via email; it contains no executable code, no prompt injection attacks, no git hooks or submodules, and the clone operation was clean with connections only to GitHub. The primary risks are structural and inherent to the skill's stated purpose: user PII and travel data are routed to BonBook's servers, the skill requires broad email inbox access to locate confirmation emails, and it can trigger real financial transactions including flight bookings and a recurring subscription. These are not hidden attack vectors but represent a significant trust relationship with an unverified third-party company that users should consciously accept before installation.

Category Scores

Prompt Injection 78/100 · 30%
Data Exfiltration 62/100 · 25%
Code Execution 97/100 · 20%
Clone Behavior 83/100 · 10%
Canary Integrity 85/100 · 10%
Behavioral Reasoning 63/100 · 5%

Findings (8)

HIGH User PII and travel data routed to third-party BonBook service by design -25

The skill's core function transmits user travel requests and personal data — including legal name, date of birth, sex, and optionally passport numbers and airline loyalty account details — to BonBook's backend via email and web forms. This is not a hidden exfiltration attempt; it is the stated purpose. However, it requires users to unconditionally trust an unverified third-party company as custodian of sensitive identity and financial data, with limited ability to audit BonBook's actual security practices.

HIGH Requires broad email inbox access beyond narrow send-to-BonBook use case -13

The skill requires the agent to read the user's email inbox to locate confirmation emails from [email protected]. This permission is substantially broader than sending a single outbound email — it grants the skill (and by extension BonBook's email content) access to the user's full inbox. The skill itself acknowledges this in its documentation, noting that 'email permissions are broader than this skill's usage.'

MEDIUM Skill can trigger real financial transactions with platform-dependent friction -20

The skill is designed to book flights (potentially hundreds to thousands of dollars) and enroll users in a recurring $1/day subscription. While the skill states require-explicit: true and mandates human approval for payment steps, the actual friction depends on how the host agent platform enforces these requirements. A permissive platform could allow financial commitments to proceed with minimal oversight.

MEDIUM Third-party trust dependency on unverified company with limited track record -17

The skill's entire safety model depends on BonBook behaving exactly as described in the skill documentation. BonBook is not a well-known established travel agency; verifiable trust signals are limited to WHOIS domain ownership (since 2024) and a self-asserted Delaware incorporation. Users have no independent means to verify BonBook's actual security practices, data retention behavior, financial stability, or ownership.

LOW Skill directs agent to navigate external URL and complete web forms with user PII -12

The skill instructs the agent to navigate to https://bonbook.co/access for account creation. This makes the agent a consumer of third-party web content during an action involving sensitive user data. While the require-explicit flag should gate this, the agent's behavior on that page is determined by the page's content, not the skill's documentation.

LOW Canary credential files read twice during monitoring window -17

Highly sensitive credential files (.env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and GCP application_default_credentials.json) were opened and read in two distinct batches during the monitoring period. The first batch occurred at monitoring start (audit timestamp 1771735697); the second occurred approximately 20 seconds later at 1771735717, approximately 5 seconds after the cp installation command completed. The skill contains no executable code that could cause these reads, and all files remain unmodified, consistent with the oathe-audit system performing pre/post baseline integrity checks.

INFO No executable code present — pure documentation skill -3

The skill consists entirely of three text files. No scripts, compiled code, package manifests, git hooks, submodules, or symlinks were found. The installation performed a standard sparse git checkout with no code execution triggered by skill content. This is the lowest-risk code execution profile a skill can have.

INFO All honeypot files confirmed intact after installation 0

The oathe-audit monitoring system confirmed all canary files remain unmodified following skill installation. No write, delete, truncate, or rename events were detected on any honeypot credential file. The read-only access pattern observed is consistent with audit baseline operations.