Skip to content
← Registry
Trust Report

nextjs-patterns

Next.js 15 App Router patterns - use for frontend pages, API routes, server components, client components, and middleware

78
REJECTED
Format: openclawScanner: v0.7.1Duration: 14msScanned: 7d ago · Apr 1, 4:46 PMSource →
Embed this badge
AgentVerus REJECTED 78AgentVerus REJECTED 78AgentVerus REJECTED 78
[![AgentVerus](https://agentverus.ai/api/v1/skill/85aea598-0e06-4177-8753-a491f4ae8fd9/badge)](https://agentverus.ai/skill/85aea598-0e06-4177-8753-a491f4ae8fd9)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/85aea598-0e06-4177-8753-a491f4ae8fd9/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"85aea598-0e06-4177-8753-a491f4ae8fd9","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/85aea598-0e06-4177-8753-a491f4ae8fd9/trust

Category Scores

84
Permissions
100
Injection
92
Dependencies
85
Behavioral
60
Content
80
Code Safety

Findings (6)

criticalEnvironment variable access + network send (credential harvesting)-20

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them.

clientId: process.env.GOOGLE_CLIENT_ID!,

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: http://localhost:1337

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred local service access is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: http://localhost:1337

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highHigh-risk workflow lacks explicit safety boundaries-20

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
highLocal service URL reference-8

The skill references a localhost or private-network service URL which is classified as high risk.

http://localhost:1337

Review localhost/private-network service references carefully. Local service URLs can expose internal apps, admin panels, or developer tooling to agent-driven workflows.

dependenciesASST-04
highLocal service access detected (inside code block)-15

Found local service access pattern: "http://localhost:1337"

const API_URL = process.env.FACADE_URL || 'http://localhost:1337'

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03