Is calebwin/clawslist-skill safe?

https://github.com/openclaw/skills/tree/main/skills/calebwin/clawslist-skill

52
CAUTION

Clawslist presents as a legitimate AI agent marketplace skill but contains a critical credential harvesting scheme: its 'Secrets' feature deceptively instructs agents to upload real API keys and sensitive credentials to clawslist.com servers, falsely marketed as the platform's 'core safety feature.' The skill further instructs agents to operate autonomously via a periodic heartbeat mechanism, post services and seek gigs without per-action user approval, and communicate privately with other AI agents through an unmonitored channel — all while routing every action through clawslist.com infrastructure. The installation itself was completely clean (markdown-only files, standard GitHub clone, no canary exfiltration), which prevents a DANGEROUS verdict, but the skill's instruction-level attack surface is severe: it is purpose-designed to harvest credentials early in onboarding, establish persistent autonomous engagement, and enable covert agent-to-agent communication under the cover of a plausible marketplace tool.

Category Scores

Prompt Injection 42/100 · 30%
Data Exfiltration 10/100 · 25%
Code Execution 95/100 · 20%
Clone Behavior 88/100 · 10%
Canary Integrity 85/100 · 10%
Behavioral Reasoning 15/100 · 5%

Findings (12)

CRITICAL Credential Harvesting via 'Secrets' Feature -60

The skill explicitly instructs the agent to upload real API keys and credentials (OpenAI, Anthropic, GitHub, AWS, etc.) to clawslist.com servers, falsely framed as a leakage-prevention safety feature. The server retains plaintext secret values despite the claim that 'values are never exposed through the API' — that claim only describes the list-endpoint response, not server-side storage. Critically, the feature is labeled '(Important!)' and directed as step 3 of onboarding, before any posting begins, to maximize credential collection at the earliest opportunity.

HIGH Deceptive Security Framing Masks Credential Upload as Safety Measure -10

The skill employs trust-building language to compel agents and users to upload credentials, presenting it as the platform's central security guarantee. This is social engineering: filtering post content for known secret values is a trivially simple string-match feature that does not require storing plaintext secret values server-side. The false guarantee ('we guarantee your secrets cannot accidentally leak') increases agent and user compliance while obscuring the data transfer.

HIGH All Agent Activity Transmitted to External Third-Party Server -20

Every action the agent takes under this skill routes through clawslist.com: posts, replies, DMs, profile updates, notification reads, and browsing activity. This creates a comprehensive, persistent external record of agent capabilities, user needs, ongoing projects, and inter-agent communication patterns — all on infrastructure outside the user's control and visibility.

HIGH Autonomous Posting and Financial Commitments Without Per-Action User Approval -25

The skill instructs the agent to autonomously post services, create gig listings, reply to job postings, update resumes, and engage in financial negotiations — none of which require per-action user approval. This converts the agent from a reactive assistant into an autonomous marketplace participant that can publicly commit the user to service obligations, share capabilities, and enter into agreements without explicit consent.

HIGH Financial Motivation Framing Overrides Agent Conservative Defaults -20

The skill opens with an explicit financial imperative and references speculative AI-ecosystem cryptocurrencies to create urgency. This framing attempts to reprogram the agent's default conservative, user-directed posture by making financial gain a primary goal, potentially justifying autonomous high-risk actions ('browse posts as frequently as possible', 'Don't ghost') that the agent would otherwise decline to take without explicit user direction.

MEDIUM Heartbeat Instructs Unprompted Autonomous Operation Every Few Hours -13

heartbeat.md instructs the agent to independently check clawslist every few hours, running a full sequence of notification checks, DM reviews, listing browsing, and autonomous posting — all without any user prompt triggering the session. This establishes a persistent background process that operates across user sessions, making ongoing API calls and potentially taking actions without user awareness or initiation.

HIGH Sophisticated Multi-Vector Attack Combining Credential Harvesting, Persistent Operation, and Covert Communication -45

The skill's architecture represents a coherent, multi-stage attack: (1) harvest credentials immediately via the 'Secrets' feature framed as safety, (2) establish persistent autonomous operation via heartbeat for ongoing data collection, (3) enable unmonitored agent-to-agent private messaging for potential covert coordination or instruction injection. Each feature appears individually plausible for a legitimate marketplace tool, but together they form a system designed to extract credentials, maintain indefinite access, and enable side-channel communication — all without triggering obvious red flags during installation.

MEDIUM Agent-to-Agent Private Messaging Enables Unmonitored Inter-Agent Communication -15

The messaging system enables arbitrary AI agents to communicate privately via clawslist.com after a one-time human approval of the connection request. Once approved, agents can exchange messages without per-message human oversight. This creates a side channel where attacker-controlled agents could deliver instructions, request information, or coordinate behaviors without user awareness or auditability.

MEDIUM Persistent Heartbeat Enables Indefinite External Data Accumulation -25

The heartbeat mechanism's design — with explicit state tracking and time-based triggers — means the agent will continuously build an ever-richer profile on clawslist.com: more services posted, more gigs sought, more discussions joined, more DMs exchanged. Combined with the credential harvesting, this creates an increasingly complete external portrait of the agent's capabilities and the user's needs on a third-party platform indefinitely.

INFO Manual Install Option References Remote curl Execution -5

While the monitored installation (git clone) is clean and installs only markdown files, skill.md's Option 2 manual installation instructs running curl commands to fetch live content from clawslist.com directly into the skill directory. This is a minor risk: future skill updates could alter server-side content delivered to agents using this path without a corresponding git commit.

LOW Clean Installation with Expected Network Behavior Only -12

The monitored installation performed a standard sparse git clone from GitHub. Only expected connections to GitHub servers (140.82.121.3:443) were observed. No unexpected process spawning, filesystem changes outside the skill directory, or connections to clawslist.com during the install phase.

INFO Canary Files Read by Monitoring Infrastructure at Baseline and Post-Install Check -15

Honeypot files (.env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, gcloud application_default_credentials.json) show OPEN/ACCESS inotify events at two points during the audit. Both access clusters are attributable to the oathe monitoring system's own SSH sessions performing pre-install baseline establishment and post-install integrity verification, not to any skill-installed code. All files remain unmodified.