Is galacticpuffin/lead-hunter safe?

https://github.com/openclaw/skills/tree/main/skills/galacticpuffin/lead-hunter

78
CAUTION

The lead-hunter skill is pure documentation with no executable code and a clean install process, but its design is inherently oriented toward mass unconsented personal data collection, LinkedIn ToS evasion, and data brokering — activities that carry significant legal and ethical risk. Two rounds of canary credential file reads were detected during monitoring; while the skill cannot have caused these accesses (no code exists to do so), the post-install round lacks a clean audit log attribution and warrants follow-up. The primary risk is not in what the skill does at install time, but in what it directs an agent to do: automated surveillance of individuals across platforms, proxy-evaded LinkedIn scraping, auto-outreach spam, and data export to configurable webhook endpoints that could be attacker-controlled.

Category Scores

Prompt Injection 87/100 · 30%
Data Exfiltration 52/100 · 25%
Code Execution 92/100 · 20%
Clone Behavior 95/100 · 10%
Canary Integrity 85/100 · 10%
Behavioral Reasoning 40/100 · 5%

Findings (11)

HIGH Unexplained post-install credential file reads — canary honeypots accessed twice -28

Auditd PATH records show two distinct rounds of READ access to all six honeypot credential files. The first round at 1771905573 (pre-install) is consistent with audit harness initialization. The second round at 1771905590 occurs 17 seconds after the git clone of github.com completed, after the cp and rm -rf install steps concluded. No EXECVE in the visible audit log can be attributed to the skill for this second round. The skill contains no executable code that could trigger file access, and canary files were not modified. Attribution to audit harness is likely but inconclusive due to log truncation.

HIGH Skill designed for mass unconsented PII collection — core use case, not edge case -20

The skill's documented primary purpose is automated bulk collection of personally identifiable information (names, emails, phone numbers, LinkedIn profiles, social media handles, company financials, tech stacks) about individuals who have not consented to being profiled. The skill documentation explicitly markets this as 'collecting 24/7' and for 'completing lead research bounties faster than anyone else.' At scale this constitutes systematic surveillance of individuals and is unlawful without a legal basis under GDPR, CCPA, and similar frameworks.

HIGH LinkedIn scraping explicitly encouraged with proxy evasion — ToS violation and potential CFAA -15

The discovery/sources.md file dedicates a section to LinkedIn discovery marked HIGH RISK, describing use of residential proxies and third-party scraping services (PhantomBuster, LinkedHelper) specifically to evade LinkedIn's anti-scraping measures. This is an intentional circumvention of a technical protection measure, potentially qualifying as unauthorized computer access under the CFAA (hiQ v. LinkedIn notwithstanding for public data). The skill treats this violation as a configuration choice rather than a bright line.

MEDIUM Webhook mechanism enables silent data exfiltration to arbitrary endpoints -13

The output/integrations.md defines a webhook configuration that fires on 'hot lead' events, POSTing the full_lead_object (name, email, phone, company, score, signals) to ${WEBHOOK_URL}. This URL is user-configurable. If an attacker can influence configuration (via a malicious commit, social engineering, or by listing a poisoned config template), all collected lead data — including any user contacts enriched by the agent — would be silently transmitted to attacker infrastructure. No authentication or domain allowlisting is described.

MEDIUM Data brokering use case — selling collected PII without data subject consent -10

The SKILL.md explicitly promotes two use cases that constitute unlicensed data brokering: selling lead lists to other businesses and completing 'data bounties' on Moltbook. Selling personal data (emails, phones, social profiles) without the data subjects' consent violates GDPR Article 6 (no lawful basis), CCPA data broker registration requirements, and similar frameworks. This is not a theoretical misuse — it is the documented business model.

MEDIUM Auto-outreach trigger could send unsolicited bulk communications without per-send authorization -5

The scoring pipeline defines automatic action triggers: 'hot' leads trigger immediate outreach, 'warm' leads are added to outreach sequences. If the agent is connected to the user's email account, this pipeline could autonomously send bulk unsolicited emails to collected leads without explicit per-send user authorization. This creates CAN-SPAM, GDPR (legitimate interest challenge), and mail reputation liability. The pipeline is designed to run 24/7 without human review.

MEDIUM Webhook and CRM API keys are environment-variable configured — susceptible to supply-chain misconfiguration -8

All integration credentials (${HUBSPOT_KEY}, ${PIPEDRIVE_KEY}, ${WEBHOOK_URL}, ${TWITTER_BEARER_TOKEN}, ${GITHUB_TOKEN}, etc.) are injected via environment variables or config files. An attacker who can influence the agent's environment (via a malicious .env file in a repo, poisoned config, or compromised secret store) could redirect all collected data to attacker-controlled CRM instances or webhooks.

LOW Two rounds of canary credential file reads detected — attribution inconclusive -15

Both inotify and auditd confirm READ access (not write) to all six canary files in two rounds. Files were not modified and canary integrity is confirmed. The second round at 1771905590 lacks a clear EXECVE attribution in the visible logs. Most likely from audit harness post-install verification, but if a process outside the audit harness triggered these reads, it would indicate credential-sweeping behavior consistent with reconnaissance.

LOW References unincluded external CLI binary — agent may attempt to source and execute it -8

The Quick Start section instructs running 'lead-hunter discover --icp tech-startup' but no such binary exists in the skill package. An agent following this instruction may attempt to locate, download, or install an external lead-hunter package to fulfill the task. If such a package exists in a public registry under an attacker-controlled namespace, this creates a dependency confusion or typosquatting attack surface.

LOW SMTP-ping email verification constitutes unauthorized probing of third-party mail servers -7

The free verification stack in enrichment/email-discovery.md includes 'smtp_check: validates Mailbox exists (SMTP ping)'. Sending SMTP-level connection attempts to verify arbitrary email addresses at target companies is unauthorized use of those mail servers, can trigger security alerts at targets, and in bulk constitutes probe activity that many MTAs log and block. This is flagged as 'risky' even within the skill documentation.

INFO Install process is clean standard git sparse-checkout — no suspicious behavior 0

The install script performed: git clone --depth 1 (to github.com only), git sparse-checkout set (to isolate the skill subdirectory), cp -r to the destination, rm -rf cleanup. No unexpected processes, no outbound connections beyond GitHub, no writes outside the skill directory. Process execution matches the expected audit harness install pattern exactly.