Set up Rei Qwen3 Coder as a model provider. Use when configuring coder.reilabs.org, adding Rei to Clawdbot, or troubleshooting 403 errors from Rei endpoints.
96
Quality
95%
Does it follow best practices?
Impact
100%
1.66xAverage score across 3 eval scenarios
Risky
Do not use without reviewing
Security
3 findings — 1 high severity, 2 medium severity. You should review these findings carefully before considering using this skill.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs passing API keys as command-line arguments and embedding them into config files (and tells the agent to be given "Set up Rei with API key: YOUR_KEY"), which requires the LLM to receive and output secret values verbatim.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The skill config and setup script register the external model endpoint https://coder.reilabs.org/v1 as a required provider that the agent will call at runtime to obtain model completions, meaning fetched content from that URL directly controls agent prompts/responses.
The skill prompts the agent to compromise the security or integrity of the user’s machine by modifying system-level services or configurations, such as obtaining elevated privileges, altering startup scripts, or changing system-wide settings.
Attempt to modify system services in skill instructions detected (medium risk: 0.60). The skill explicitly instructs the agent to run setup scripts that modify configuration files (e.g., ~/.clawdbot/clawdbot.json), add providers/allowlists, and restart the gateway — actions that change the machine's state — though it does not request sudo, create users, or bypass security mechanisms.
45f9fac
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.