Ask Claude

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill delegates work to Claude Code but disables normal permission prompts, relies on an unreviewed local wrapper script, and makes overbroad privacy claims.

Install only if you are comfortable letting an agent run Claude Code over selected directories with permission prompts bypassed. Verify the referenced wrapper script before use, avoid sensitive workdirs, and assume prompts/project context may be processed by Claude and retained in local Claude session history.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Claude Code may edit files or run commands without the normal permission prompts the user might expect.

Why it was flagged

The skill instructs the agent to run Claude Code with permission bypass enabled, while the description says Claude Code may use file editing, code analysis, and bash.

Skill content
claude --permission-mode bypassPermissions --print "task"
Recommendation

Avoid bypassPermissions by default; require explicit user approval for file edits, shell commands, and destructive or account-impacting actions.

What this means

The agent could execute unreviewed local code whose behavior is unknown from the submitted skill artifacts.

Why it was flagged

The primary command executes a wrapper script from a fixed local path, but that script is not included in the file manifest or install spec for review.

Skill content
OUTPUT=$(/home/xmanel/.openclaw/workspace/run-claude.sh "prompt" "/workdir")
Recommendation

Include the wrapper script in the package, document its provenance, or use only the fully shown direct command.

What this means

A user may incorrectly believe their prompts and project files stay fully local when using this skill.

Why it was flagged

These strong privacy claims conflict with the skill's core behavior of delegating prompts and workdir context to the Claude Code CLI.

Skill content
Safe execution: no data exfiltration, no external calls ... Never send data to external servers
Recommendation

Clearly state what data Claude Code may receive, where it is processed, and which privacy guarantees are actually enforced.

What this means

Tasks may run under the user's existing Claude account or CLI session, with unclear account scope, auditability, or usage implications.

Why it was flagged

The skill invokes the locally installed Claude CLI but declares no primary credential or account boundary, so execution may rely on an existing local Claude session/profile without clear disclosure.

Skill content
env -u CLAUDECODE claude --permission-mode bypassPermissions --print
Recommendation

Declare the credential/session dependency and tell users how to choose, verify, or isolate the Claude CLI account used by the skill.

What this means

Future Claude tasks in the same workdir may be influenced by prior prompts, files, edits, or sensitive context.

Why it was flagged

The skill intentionally uses persistent sessions with retained context, which is purpose-aligned but can preserve sensitive or stale information across later tasks.

Skill content
Claude Code stores sessions per-directory in `~/.claude/projects/` ... same file context, same conversation history, same edits.
Recommendation

Use new sessions for unrelated or sensitive work and provide clear instructions for clearing stored Claude session context.