Researcher Report β 2026-03-25
Run time: 2026-03-25 01:04 ET
Phase 1: Tech Research
Sources scanned: 708 items across HN + RSS feeds
Candidates after scoring: 15
CBL evaluated: 15
EAT (queued to fridge)
-
[EAT] MCP Security Bench (MSB): Benchmarking Attacks Against Model Context Protocol in LLM Agents β _β
queued_
-
[EAT] From Static Templates to Dynamic Runtime Graphs: A Survey of Workflow Optimization for LLM Agents β _β
queued_
-
[EAT] Agent Audit: A Security Analysis System for LLM Agent Applications β _β
queued_
-
[EAT] CyberGym: Evaluating AI Agents' Real-World Cybersecurity Capabilities at Scale β _β
queued_
HOLD (notable but not fridged)
-
[HOLD] AI Co-Scientist for Ranking: Discovering Novel Search Ranking Models alongside LLM-based AI Agents with Cloud Computing Access β
-
[HOLD] Hypura β A storage-tier-aware LLM inference scheduler for Apple Silicon β
-
[HOLD] PersonalQ: Select, Quantize, and Serve Personalized Diffusion Models for Efficient Inference β
-
[HOLD] Founder effects shape the evolutionary dynamics of multimodality in open LLM families β
-
[HOLD] From Instructions to Assistance: a Dataset Aligning Instruction Manuals with Assembly Videos for Evaluating Multimodal LLMs β
- _(and 6 more HOLD items)_
Phase 2: PaperTrader Experiments
_No snapshot data available for today._
Phase 2 Errors
- β οΈ No snapshot for today β cannot analyze performance
Phase 3: Optimization Analysis
> _Stale files and cron health are auditor territory (autoaudit). This phase covers cost and model routing only._
Cost Optimization Suggestions
-
bizbot (currently Opus): Evaluate if Sonnet or Haiku could handle this task β ~10-50x cost reduction per run
Cost Optimization Opportunities
-
Opus referenced in 29 mentions across 31 sessions (43% of model refs)
β Review Opus-heavy sessions β most tasks could run on Sonnet at ~10x lower cost _Up to ~10x on affected calls_
Phase 4: ClawHub Skill Scan
35 suspicious skill(s):
-
[SUSPICIOUS] mcp-skill β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-01-26), no visible source code, vague description that doesn't specify what "MCP tools" are or their exact capabilities, and requests broad network access (web search, crawling, LinkedIn search) without clear permission boundaries or usage documentation.
-
[SUSPICIOUS] mcp-hass β [SUSPICIOUS]
Multiple red flags: zero downloads on newly published skill (2026-02-10), no visible source code reference, requests network access to control external devices, and the description is directive in nature ("for control...devices") rather than descriptive.
-
[SUSPICIOUS] openclaw-mcp-plugin β [SUSPICIOUS]
Multiple red flags present: zero downloads combined with new publication date (2026-02-02), no visible source code repository, requests broad network access and process spawning capabilities, vague description that could enable arbitrary tool execution, and the description itself reads as agent-directed instructions ("Enable AI agents to discover and execute tools").
-
[SUSPICIOUS] atlassian-mcp β [SUSPICIOUS]
Red flags present: (1) Zero downloads with very recent publication date (2026-01-25), (2) Requests Docker execution and filesystem access outside workspace, (3) Requires external API credentials, (4) No visible source code repository linked, (5) Single new author with no track record.
-
[SUSPICIOUS] clickup-mcp β [SUSPICIOUS]
Red flags present: No visible source code, zero downloads with new publication date (2026-01-06), requests OAuth authentication and network access to external service (ClickUp), and the vague description lacks implementation details or security documentation typical of legitimate MCP tools.
-
[SUSPICIOUS] glin-profanity-mcp β [SUSPICIOUS]
Multiple red flags present: zero downloads combined with very recent publication (2026-02-01), no visible source code repository linked, vague permission scope for "profanity detection tools," and the description's phrasing ("Use when reviewing batches of user content") reads as directive instructions to an AI agent rather than neutral documentation.
Not recommended for installation without: (1) verified author identity, (2) public source code audit, (3) explicit permission boundaries, and (4) demonstration of legitimate use cases beyond zero-download status.
-
[SUSPICIOUS] xiaohongshu-mcp-skill β [SUSPICIOUS]
Red flags identified: (1) Zero downloads + newly published account (2026-02-28), (2) No visible source code repository linked, (3) Vague description with ellipsis suggesting truncated/incomplete documentation, (4) Requests network access to external Xiaohongshu platform + local MCP service spawning, (5) Author "palmpalm7" has no verifiable history.
-
[SUSPICIOUS] mcp-client β [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-22), no visible source code mentioned, vague description that doesn't specify what MCP implementation or which data sources/services it connects to, and the broad "connect to tools, data sources and services" language lacks concrete technical detail typical of legitimate integrations.
-
[SUSPICIOUS] wordpress-mcp β [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published (2026-02-10) from new author, (2) No visible source code repository linked, (3) Requires external plugin dependency (AI Engine) with vague "MCP Server enabled" setup, (4) Description reads partially as agent instructions ("Use for creating/editing posts... when asked about WordPress site management"), (5) Broad permission scope across WordPress admin tasks without specifying exact API boundaries or authentication model.
Not relevant to active projects (no mcp/automation/
-
[SUSPICIOUS] openclaw-mcp-debugger β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (2026-03-04), vague truncated description ("providing deep-..." incomplete), no visible source code, and the skill name/purpose suggests it interfaces with external systems (MCP connections) which requires careful vetting of actual permissions and network access capabilities.
-
[SUSPICIOUS] automation-workflows β [SUSPICIOUS]
Zero downloads + brand new account (2026-02-06) + vague description lacking implementation details + no visible source code repository linked = classic untrusted external content profile matching common skill-farm patterns on package hubs.
-
[SUSPICIOUS] ai-web-automation β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (2026-02-20), no visible source code mentioned, vague description that could mask arbitrary code execution, and the skill requests broad capabilities (multi-browser support, filesystem access for scheduling) without transparent implementation details.
-
[SUSPICIOUS] automation-workflows-0-1-0 β [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-07, author "lucasayala" with no visible reputation), no visible source code repository linked, and vague implementation details (mentions tool names but no concrete technical architecture or code samples).
-
[SUSPICIOUS] agentic-workflow-automation β [SUSPICIOUS]
Red flags present: (1) Zero downloads + new account (published 2026-02-26, author "0x-professor"), (2) Vague/truncated description ("...automation handoff arti..." appears cut off), (3) Description contains agent-directed language ("Use for trigger/action orchestration... automation handoff"), (4) No visible source code repository linked, (5) Requests unclear permissions for "multi-step agent workflow" execution.
-
[SUSPICIOUS] afrexai-business-automation β [SUSPICIOUS]
Red flags: Zero downloads + new account (published 2026-02-13), no visible source code, description is directive text aimed at an AI agent ("Turn your AI agent into..."), vague implementation claims ("no n8n or Zapier required" without technical details), and requests are unspecified but automation skills typically require broad system access.
-
[SUSPICIOUS] ai-automation-consulting β [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication date (2026-03-14), vague/generic description offering consulting services rather than technical functionality, no visible source code indicated, and the skill appears to be a service offering rather than an executable tool with defined inputs/outputs.
-
[SUSPICIOUS] automation-tool β [SUSPICIOUS]
Zero downloads + newly published account + vague description in non-English + "automation tool" is generic keyword matching rather than specific functionality = classic honeypot pattern; additionally, no visible source code and broad "batch generation" claims without technical specifics raise trustworthiness concerns.
-
[SUSPICIOUS] productivity-automation-kit β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-03-21), vague description lacking technical specifics or API documentation, no visible source code repository linked, and the description reads as marketing copy rather than technical specificationβmaking it impossible to verify what permissions or external calls it actually requires.
-
[SUSPICIOUS] ai-ceo-automation β
[SUSPICIOUS]
Multiple critical red flags: zero downloads with very recent publish date (2026-02-28), vague description offering "fully automated company operations" without technical specifics, no visible source code repository linked, and the scope suggests potential for excessive permissions (process spawning, system control). The generic nature combined with zero community validation makes this high-risk.
-
[SUSPICIOUS] ai-web-automation-1-0-0 β [SUSPICIOUS]
Multiple critical red flags: zero downloads with newly published skill (2026-03-04), requests dangerous permissions (network access, filesystem, process spawning via Selenium/Puppeteer), no visible source code repository link, and vague implementation details that could mask malicious behavior.
-
[SUSPICIOUS] homelab-cluster β
[SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-02-12), vague description lacking technical specifics, no visible source code repository linked, and "expert MoE routing" claims without implementation details warrant caution before any Ghost review.
-
[SUSPICIOUS] truenas-skill β [SUSPICIOUS]
Multiple red flags: zero downloads with brand new account (2026-02-09), no visible source code repository linked, requests network access to external TrueNAS API and filesystem operations, and the description is vague about authentication/security handling for sensitive NAS credentials.
If considering: This could support homelab/automation projects, but requires source code review and clarification on credential management before use.
-
[SUSPICIOUS] homeserver β [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication (2026-02-23), vague truncated description ending in "ba..." suggesting incomplete/hidden functionality, requests direct system access (Docker, Wake-on-LAN, port scanning, filesystem), spawns external processes (homebutler CLI), and new author account with no reputation history.
Project relevance: Would match homelab/automation keywords, but security concerns prohibit consideration.
-
[SUSPICIOUS] pi-admin β [SUSPICIOUS]
This skill exhibits multiple red flags: zero downloads combined with a very recent publish date (2026-01-14), no visible source code repository linked, vague description that doesn't specify implementation details, and the nature of "system administration" on Raspberry Pi typically requires elevated permissions and process spawning capabilities that warrant careful scrutiny before installation.
-
[SUSPICIOUS] pi-health β [SUSPICIOUS]
Red flags: Zero downloads + newly published (2026-02-09), no visible source code repository linked, vague technical scope, and the description reads as instructions directed at an AI agent ("Use when monitoring Pi health, diagnosing thermal throttling...").
-
[SUSPICIOUS] trading β [SUSPICIOUS]
Red flags present: Zero downloads + newly published (2026-02-12), no visible source code repository linked, vague description lacking implementation details, and "trading" is listed as a project keyword but this appears to be financial advice/analysis tooling rather than a technical skill aligned with typical automation/infrastructure projects.
-
[SUSPICIOUS] trading-devbox β [SUSPICIOUS]
Multiple red flags: zero downloads combined with very recent publication date (2026-02-25), no visible source code repository linked, vague description that could mask arbitrary code execution, and the skill involves dynamic Python code generation ("agent writes a Python backtest strategy") which creates inherent injection risks when processing user natural language input.
-
[SUSPICIOUS] trading-brain β [SUSPICIOUS]
This skill exhibits multiple critical red flags: zero downloads from a new account (2026-02-27), vague description lacking technical implementation details, the phrase "Load Travis's personal trading strategy" suggests accessing external/private data, and "guide aggressive trades" implies autonomous financial decision-making without transparent logicβall typical markers of either poorly vetted or potentially malicious third-party code.
Not recommended for installation without source code audit and explicit permission model review.
-
[SUSPICIOUS] auto-trading-strategy β [SUSPICIOUS]
Red flags: Zero downloads + brand new account (published 2026-03-13), vague description without technical specifics, requests for "trading strategy guides" lack concrete skill mechanics, and the author "863king" has no visibility history β matches classic pattern of low-effort or potentially malicious skill submission.
-
[SUSPICIOUS] openmm-grid-trading β [SUSPICIOUS]
Red flags identified: Zero downloads from new account (published 2026-02-25), no visible source code repository linked, vague description lacking implementation details, and "grid trading strategies" with financial implications requires strict code auditing before any deployment.
-
[SUSPICIOUS] skill-trading-journal β [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account, (2) Vague/truncated description that doesn't specify implementation details, (3) No visible source code repository linked, (4) "trading" keyword match creates financial risk surface that requires careful vetting of actual functionality and data handling before use.
-
[SUSPICIOUS] finance-trading β [SUSPICIOUS]
Red flags identified: (1) Zero downloads + new/recent publication date (2026-03-17), (2) No visible source code repository linked, (3) Requests network access (real-time BTC/USDT trading data), (4) Vague implementation details β unclear what "paper trading strategy" entails or what external APIs/services it depends on, (5) Author account "brioche-bit" with no verifiable history.
This skill should not be vetted further without: published source code, explicit API
-
[SUSPICIOUS] trading-software-efficiency β [SUSPICIOUS]
Red flags present: (1) Zero downloads + newly published account (2026-03-16), (2) No visible source code repository linked, (3) Vague description lacking technical specifics about implementation, (4) Request for "trading software" efficiency with keyboard shortcuts suggests potential for keystroke logging or unauthorized process spawning, (5) Author account "haohanyang92" has no verifiable history.
This skill requests interaction with trading platforms which typically requires elevated system access and filesystem permissions outside a sandboxed workspaceβa common attack
-
[SUSPICIOUS] shadow-trading-dashboard β [SUSPICIOUS]
Multiple red flags: zero downloads + brand new account (published 2026-03-18), no visible source code repository linked, vague description that could mask unauthorized financial data access, and the skill name suggests managing real trading positions which implies filesystem/network access to sensitive financial data outside a controlled workspace.
-
[SUSPICIOUS] trading-automaton β [SUSPICIOUS]
Multiple red flags: zero downloads with very recent publication date (2026-03-24), new/unknown author account, vague description without visible source code transparency, and the skill requests capabilities (network access for live trading data, process spawning for automated execution) that pose financial and system security risks.
Budget Summary
Total spent: $0.0277 / $5.00 cap
API calls: 50
Tokens: 18864 input + 3149 output
| Model | Input | Output | Cost | Note |
|-------|-------|--------|------|------|
| claude-haiku-4-5 | 245 | 24 | $0.000292 | CBL:MCP Security Bench (MSB): Benchmarki |
| claude-haiku-4-5 | 249 | 20 | $0.000279 | CBL:AI Co-Scientist for Ranking: Discove |
| claude-haiku-4-5 | 235 | 24 | $0.000284 | CBL:Hypura β A storage-tier-aware LLM in |
| claude-haiku-4-5 | 245 | 26 | $0.000300 | CBL:PersonalQ: Select, Quantize, and Ser |
| claude-haiku-4-5 | 237 | 27 | $0.000298 | CBL:Founder effects shape the evolutiona |
| claude-haiku-4-5 | 250 | 28 | $0.000312 | CBL:From Instructions to Assistance: a D |
| claude-haiku-4-5 | 240 | 21 | $0.000276 | CBL:DAQ: Delta-Aware Quantization for Po |
| claude-haiku-4-5 | 253 | 24 | $0.000298 | CBL:KALAVAI: Predicting When Independent |
| claude-haiku-4-5 | 259 | 21 | $0.000291 | CBL:YOLOv10 with Kolmogorov-Arnold netwo |
| claude-haiku-4-5 | 233 | 24 | $0.000282 | CBL:Quantifying Systemic Vulnerability i |
| claude-haiku-4-5 | 243 | 26 | $0.000298 | CBL:End-to-End Efficient RL for Linear B |
| claude-haiku-4-5 | 238 | 22 | $0.000278 | CBL:A Critical Review on the Effectivene |
| claude-haiku-4-5 | 242 | 24 | $0.000290 | CBL:From Static Templates to Dynamic Run |
| claude-haiku-4-5 | 234 | 24 | $0.000283 | CBL:Agent Audit: A Security Analysis Sys |
| claude-haiku-4-5 | 244 | 26 | $0.000299 | CBL:CyberGym: Evaluating AI Agents' Real |
| claude-haiku-4-5 | 418 | 74 | $0.000630 | ClawHub:mcp-skill |
| claude-haiku-4-5 | 407 | 58 | $0.000558 | ClawHub:mcp-hass |
| claude-haiku-4-5 | 436 | 74 | $0.000645 | ClawHub:openclaw-mcp-plugin |
| claude-haiku-4-5 | 467 | 73 | $0.000666 | ClawHub:atlassian-mcp |
| claude-haiku-4-5 | 416 | 63 | $0.000585 | ClawHub:clickup-mcp |
| claude-haiku-4-5 | 450 | 120 | $0.000840 | ClawHub:glin-profanity-mcp |
| claude-haiku-4-5 | 447 | 97 | $0.000746 | ClawHub:xiaohongshu-mcp-skill |
| claude-haiku-4-5 | 404 | 77 | $0.000631 | ClawHub:mcp-client |
| claude-haiku-4-5 | 476 | 120 | $0.000861 | ClawHub:wordpress-mcp |
| claude-haiku-4-5 | 427 | 72 | $0.000630 | ClawHub:openclaw-mcp-debugger |
| claude-haiku-4-5 | 495 | 55 | $0.000616 | ClawHub:automation-workflows |
| claude-haiku-4-5 | 420 | 63 | $0.000588 | ClawHub:ai-web-automation |
| claude-haiku-4-5 | 506 | 63 | $0.000657 | ClawHub:automation-workflows-0-1-0 |
| claude-haiku-4-5 | 429 | 108 | $0.000775 | ClawHub:agentic-workflow-automation |
| claude-haiku-4-5 | 439 | 82 | $0.000679 | ClawHub:afrexai-business-automation |
| claude-haiku-4-5 | 441 | 66 | $0.000617 | ClawHub:ai-automation-consulting |
| claude-haiku-4-5 | 414 | 66 | $0.000595 | ClawHub:automation-tool |
| claude-haiku-4-5 | 546 | 71 | $0.000721 | ClawHub:productivity-automation-kit |
| claude-haiku-4-5 | 401 | 82 | $0.000649 | ClawHub:ai-ceo-automation |
| claude-haiku-4-5 | 436 | 67 | $0.000617 | ClawHub:ai-web-automation-1-0-0 |
| claude-haiku-4-5 | 410 | 64 | $0.000584 | ClawHub:homelab-cluster |
| claude-haiku-4-5 | 459 | 92 | $0.000735 | ClawHub:truenas-skill |
| claude-haiku-4-5 | 424 | 101 | $0.000743 | ClawHub:homeserver |
| claude-haiku-4-5 | 404 | 78 | $0.000635 | ClawHub:pi-admin |
| claude-haiku-4-5 | 466 | 62 | $0.000621 | ClawHub:pi-health |
| claude-haiku-4-5 | 409 | 73 | $0.000619 | ClawHub:trading |
| claude-haiku-4-5 | 413 | 75 | $0.000630 | ClawHub:trading-devbox |
| claude-haiku-4-5 | 414 | 105 | $0.000751 | ClawHub:trading-brain |
| claude-haiku-4-5 | 410 | 73 | $0.000620 | ClawHub:auto-trading-strategy |
| claude-haiku-4-5 | 416 | 59 | $0.000569 | ClawHub:openmm-grid-trading |
| claude-haiku-4-5 | 428 | 75 | $0.000642 | ClawHub:skill-trading-journal |
| claude-haiku-4-5 | 426 | 120 | $0.000821 | ClawHub:finance-trading |
| claude-haiku-4-5 | 426 | 120 | $0.000821 | ClawHub:trading-software-efficiency |
| claude-haiku-4-5 | 419 | 70 | $0.000615 | ClawHub:shadow-trading-dashboard |
| claude-haiku-4-5 | 418 | 70 | $0.000614 | ClawHub:trading-automaton |