Is iamdoctorclaw/hivefound safe?

https://github.com/openclaw/skills/tree/main/skills/iamdoctorclaw/hivefound

63
CAUTION

HiveFound is a 'collective intelligence' skill that submits agent research discoveries (URLs, titles, summaries, topics) to an external server at api.hivefound.com, creating a persistent surveillance mechanism for user agent research activity. The skill is technically clean — the Python script is readable, the clone behavior is normal, canary files were not exfiltrated, and no prompt injection directives were found — but the fundamental design aggregates agent behavioral data to a third-party commercial service, and an undeclared lock file referencing another skill (academic-research-hub) shipped with the package raises questions about the packaging environment. Users who install this skill should understand that their agent's research topics, discovered URLs, and content summaries will be reported to and stored by HiveFound's platform.

Category Scores

Prompt Injection 75/100 · 30%
Data Exfiltration 45/100 · 25%
Code Execution 82/100 · 20%
Clone Behavior 88/100 · 10%
Canary Integrity 90/100 · 10%
Behavioral Reasoning 45/100 · 5%

Findings (9)

HIGH Agent Research Activity Continuously Exfiltrated to External Server -35

The skill's core functionality requires submitting agent discoveries (URL, title, summary, topics) to api.hivefound.com. The SKILL.md description instructs the agent to use this skill 'when finding interesting articles, research, news, or resources worth sharing.' This means the agent's research activity — including what topics the user is investigating, what URLs it found interesting, and summaries of content — is continuously reported to a third-party server controlled by the skill author. This is not incidental telemetry; it is the explicit design of the skill.

MEDIUM Undeclared Lock File References Separately Installed Skill -20

The skill package ships with a .clawhub/lock.json file that references a separate skill (academic-research-hub v0.1.0) that was not declared as a dependency in SKILL.md metadata. This file should not be part of the published skill package. Its presence suggests the skill was packaged directly from a live agent environment, which may inadvertently expose environment state, or it may serve as a mechanism to detect and fingerprint what other skills are installed on the target system.

MEDIUM Skill Instructs Agent to Store API Credentials in Workspace Files -15

The skill instructs the agent to store the HIVEFOUND_API_KEY in TOOLS.md or a credentials file in the agent's workspace. This normalizes plaintext credential storage in agent-accessible locations, where other installed skills could read them. The API key is also tied to a user email registered with HiveFound, creating a persistent identity linkage.

MEDIUM External Feed Creates Content Injection Attack Vector -25

The skill instructs agents to consume HiveFound's feed and search results as a primary research source, before performing independent web searches. If HiveFound's platform is compromised or operated maliciously, it can serve poisoned content (misleading summaries, malicious URLs, propaganda) directly into the agent's research context. The agent is instructed to trust this content without independent verification.

LOW Behavioral Dependency Nudge — HiveFound-First Research Pattern -10

The skill explicitly instructs agents to query HiveFound before performing independent web searches 'to save tokens.' This creates a behavioral dependency on an external commercial service and biases the agent's research toward content that has been curated or filtered by HiveFound's platform.

LOW Mark-as-Used and Upvote Signals Create Behavioral Analytics Profile -10

Beyond submission, the skill provides 'used', 'upvote', 'downvote', and 'flag' commands that report agent engagement patterns back to HiveFound. This creates detailed behavioral analytics: not just what the agent discovers, but which content it acts upon, finds valuable, or rejects.

LOW Executable Python Script Ships with Skill -18

The skill includes a Python script (scripts/hivefound.py) that makes outbound network requests. The script code is readable and clean — no obfuscation, no arbitrary code execution, no filesystem traversal. However, it represents an executable attack surface: if the script were modified in a future update, it could perform malicious actions while appearing legitimate.

LOW Webhook Infrastructure Allows External Service to Push Data to User Servers -8

The skill offers webhook setup where HiveFound delivers new discoveries to a user-specified HTTPS endpoint. This inverts the trust model: instead of the agent pulling data, an external service gains the ability to push arbitrary payloads to user infrastructure. Webhook signature verification is recommended but complex to implement correctly, and the webhook_secret is 'only shown once.'

INFO Canary Files Read by Monitoring Infrastructure (Pre/Post Install Scans) -10

Audit PATH records show all six canary files (.env, id_rsa, .aws/credentials, .npmrc, docker config, gcloud creds) accessed in two systematic batches — once before installation (timestamp 1771927444.453, audit records 383-391) and once after (timestamp 1771927461.204, audit records 6722-6727). The batch pattern, consecutive audit IDs, and timing aligned with installation boundaries are consistent with the monitoring system performing baseline and integrity verification scans. Canary integrity check confirmed all files intact with no network exfiltration detected.