toggl

clawhub:toggl

View source
B
75/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

75/100

CRITICAL 1
LOW 2

Findings (3)

CRITICAL
Instruction override combined with dangerous operations
L1

Instruction override combined with dangerous operations

Environment variables override config: TOGGL_API_TOKEN, TOGGL_DEFAULT_WORKSPACE_ID, TOGGL_TIMEZONE
FIX

Remove language that attempts to override safety guidelines or bypass system-level controls. This pattern is a strong indicator of a jailbreak attempt.

FP?

Likely FP if the matched text is in a security research document or educational content clearly marked as an example rather than an active payload.

LOW
Global package installation
L14

Detects global installation of packages which affects the host system

npm install -g @
FIX

Replace npm install -g with a local install (npm install --save-dev) or use npx with a pinned version. Global installs modify the system and risk supply chain attacks.

FP?

Likely FP if the global install is for a well-known CLI tool (e.g., typescript, eslint) in setup documentation, though the supply chain risk remains real.

LOW
Runtime URL controlling behavior
L26

Detects URLs fetched at runtime that control or influence agent behavior without pinning

Get your API token from: https:// + config
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.