Is ehudsn/orchata safe?

https://github.com/openclaw/skills/tree/main/skills/ehudsn/orchata

91
SAFE

The ehudsn/orchata skill is a clean documentation-only integration for the Orchata RAG platform, containing only SKILL.md and _meta.json with no executable code, no prompt injection, no git hooks, and no credential-harvesting instructions. Installation behavior was limited to a standard GitHub sparse-checkout clone with no unexpected network connections or canary file compromise. The primary risk is inherent to the skill's purpose: document content sent via save_document leaves the local environment and is stored in Orchata's external cloud, which users should factor into their data-handling posture.

Category Scores

Prompt Injection 95/100 · 30%
Data Exfiltration 78/100 · 25%
Code Execution 99/100 · 20%
Clone Behavior 92/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 85/100 · 5%

Findings (5)

LOW Cloud data egress via save_document / update_document -22

The skill's core functionality involves transmitting document content to Orchata's external cloud service via save_document and update_document MCP tools. Any text the agent uploads in response to user requests leaves the local environment and is stored on Orchata's infrastructure. This is the designed behavior of a RAG SaaS integration, but represents an inherent data-egress surface that users should be aware of.

INFO Cross-space wildcard document retrieval 0

The get_document tool accepts spaceId='*' to search all spaces simultaneously. If an agent is instructed to retrieve a file by name without knowing its space, it will query the entire organization's document corpus. This is a wide API scope but consistent with stated intent.

INFO Orchata API responses re-enter agent context -5

When the agent calls query_spaces or get_tree_node, the returned document content (controlled by whatever is stored in Orchata) flows back into the agent context. If an attacker could write malicious content into an Orchata space, it could attempt prompt injection via query results. This is a property of all RAG integrations, not specific to this skill.

LOW Irreversible destructive operations exposed -15

The skill documents manage_space with action='delete' and delete_document as available tools. These are permanent operations. The skill does not include any instructions urging the agent to confirm before deletion, which means a misrouted or confused agent action could permanently remove documents or entire knowledge spaces.

INFO Canary file reads by monitoring infrastructure 0

The auditd log records reads of all six honeypot files (.env, id_rsa, .aws/credentials, .npmrc, docker config, gcloud credentials) at timestamp 1771924297, which is approximately 5 seconds before the git clone of the skill begins. A second read batch occurs at 1771924320 after install completes. These are attributed to the OATHE monitoring framework performing baseline capture and final integrity verification, not to any code in the skill (which contains no executable files).