Is gumroad safe?
https://clawhub.ai/byungkyu/gumroad
This skill is a Gumroad API integration that routes all traffic through a third-party proxy (gateway.maton.ai) rather than directly to Gumroad's API. While no malicious code or active exploitation was detected, the architectural pattern places the Maton gateway in a persistent man-in-the-middle position with access to all OAuth tokens, customer data, sales records, and license keys. The skill also contains executable Python code blocks, a cross-skill reference that could expand attack surface, and a troubleshooting section that instructs the agent to print API keys.
Category Scores
Findings (11)
HIGH Third-party API gateway proxies all traffic -25 ▶
All Gumroad API calls are routed through gateway.maton.ai instead of directly to api.gumroad.com. This means the Maton gateway operator has full visibility into every API request and response, including customer emails, sales data, license keys, and OAuth tokens. The user's MATON_API_KEY is sent with every request, and the gateway 'automatically injects your OAuth token', meaning Maton holds and controls the actual Gumroad credentials.
MEDIUM API key echo in troubleshooting section -10 ▶
The troubleshooting section instructs the agent to run 'echo $MATON_API_KEY' which would print the secret API key to the console output. If the agent follows this instruction during debugging, the key appears in logs, terminal history, and potentially in LLM context that could be shared.
MEDIUM Connection management exposes OAuth session tokens -5 ▶
The connection management endpoints return URLs containing session tokens (e.g., 'https://connect.maton.ai/?session_token=...'). These tokens in API responses could be logged, cached, or exposed through agent context windows.
MEDIUM Cross-skill reference to api-gateway skill -15 ▶
The skill description includes a directive to use another skill ('For other third party apps, use the api-gateway skill') with a direct URL. This could be used to chain skills together, expanding the attack surface. An agent following this instruction would install/invoke a second skill from the same author.
MEDIUM Executable code blocks injected into agent context -10 ▶
SKILL.md contains numerous Python heredoc code blocks that an LLM agent may execute directly when asked to interact with Gumroad. While these are legitimate API examples, the pattern of including ready-to-execute code in a prompt-injected document creates risk if the skill content were modified to include malicious commands.
LOW Troubleshooting instructions may override user intent -5 ▶
The troubleshooting section provides step-by-step instructions that an agent might follow autonomously when encountering errors, including printing secrets and making additional API calls to Maton's control plane.
MEDIUM Python heredoc code blocks ready for direct execution -15 ▶
The skill contains multiple Python heredoc blocks (python <<'EOF') designed to be copy-pasted into a shell. An LLM agent will likely execute these directly. While the current code appears to make legitimate API calls, this pattern means any future modification to these blocks would be executed with the agent's full privileges.
LOW No install scripts or hooks detected 0 ▶
Package.json is empty, no git hooks, no submodules, no symlinks. The skill is purely documentation/configuration with no executable install-time code.
INFO Clean clone with no suspicious activity -5 ▶
No network connections, no process spawning, no filesystem changes outside the skill directory during installation. The filesystem events logged are Go package cache reads from the VM baseline, unrelated to this skill.
LOW Man-in-the-middle position enables future abuse -20 ▶
Even if Maton's gateway is currently benign, the architectural pattern places a third party in a persistent man-in-the-middle position for all e-commerce operations. A compromise of Maton's infrastructure would expose all users' Gumroad data, OAuth tokens, customer lists, and license keys. This is an inherent trust dependency, not a current exploit.
MEDIUM Skill chain potential with api-gateway -25 ▶
The cross-reference to the api-gateway skill from the same author suggests a pattern where multiple skills from this author expand the agent's network surface area. If both skills are installed, the agent would route traffic for multiple third-party APIs through Maton's gateway.