Back to plugin
Pluginv0.13.0

ClawScan security

Package · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 27, 2026, 6:15 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's files, runtime instructions, and configuration align with its stated n8n ops purpose; required access (n8n base URL + API key) is proportional and there are no hidden network downloads or unrelated credential requests.
Guidance
This package appears coherent for n8n ops: it needs your n8n base URL and API key so it can call the n8n HTTP API. Before enabling write features (enableEdit=true): - Prefer supplying the API key via an environment variable (apiKey left blank and set N8N_API_KEY or the configured apiKeyEnv) rather than embedding it inline. - Run in read-only mode first to inspect outputs — some queries (execution logs, search scope="all") can surface sensitive node outputs or error payloads. - Review and set backupDir (default ~/.n8n-backups) to a safe location with appropriate permissions; backups are created before destructive operations. - Note the README mentions an N8N_ENABLE_EDIT env var but the code uses the plugin config enableEdit — make sure you understand which knob your host uses to enable edits. - If you do not trust the package author, review the included source (present in the bundle) before installing, and test against a non-production n8n instance first.

Review Dimensions

Purpose & Capability
okThe package implements an n8n client and many read/write tools (list, trigger, audit, save, delete, retry, backups) which match the name/description. The code requires an n8n base URL and an API key (either inline or via an env var) — exactly what an n8n ops tool needs. No unrelated services, binaries, or hosts are requested.
Instruction Scope
noteTool instructions and code stay within n8n API interactions and local backup behavior. A caution: some read tools can return execution run-data or error payloads (and n8n_search_executions has a scope option that can return node outputs), so tool outputs may include sensitive data from workflows; the README/code warn about treating snippets as sensitive. Also the README references N8N_ENABLE_EDIT env var to show write tools, but the implementation actually uses the plugin config property enableEdit (minor inconsistency in control surface).
Install Mechanism
okNo remote download/install spec is included; the package provides source and a built dist/mcp-server.js. Nothing in the metadata indicates fetching arbitrary external archives or running installers. Dependencies are standard (modelcontextprotocol, zod, typebox).
Credentials
okThe only credential surface is the n8n API key (config.apiKey or an env var defaulting to N8N_API_KEY) and the baseUrl. That is appropriate and expected for a tool that talks to an n8n instance. No other unrelated secrets or system config paths are requested. Note: if you enable edit features, the plugin will write snapshots to backupDir (default ~/.n8n-backups) — consider filesystem permissions.
Persistence & Privilege
okalways is false and the skill does not request permanent agent-wide privileges. It may write workflow snapshots to the configured backupDir when performing saves or deletes, which is expected. The plugin does not modify other skills or global agent settings.