Compliance Evidence Assembler

PassAudited by ClawScan on May 1, 2026.

Overview

The skill appears to do the advertised local audit-evidence organization, with the main caution that it can run a local Python script to scan a user-selected evidence folder and generate a report.

This skill looks suitable for organizing audit evidence into reviewable reports. Before using it, choose a narrow input directory, avoid pointing it at broad personal or company folders, review the generated output before sharing it, and remember that it is not a substitute for a formal audit conclusion.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You have less external information for verifying the publisher or upstream project.

Why it was flagged

The artifacts disclose limited upstream provenance. No remote installer, package dependency, or hidden helper is shown, so this is a provenance notice rather than a security concern.

Skill content
Source: unknown; Homepage: https://example.invalid/skills/compliance-evidence-assembler
Recommendation

Install only if you trust the registry entry and are comfortable with the included reviewed files.

What this means

Running the helper script can read the selected input path and write a report to the selected output path.

Why it was flagged

The skill may invoke a bundled local Python script through shell/exec. This is disclosed and central to the skill's purpose, but it means the user should review the command and chosen paths.

Skill content
如运行环境允许 shell / exec,可使用:`python3 "{baseDir}/scripts/run.py" --input <输入文件> --output <输出文件>`
Recommendation

Run it only on intended evidence material, choose a safe output path, and use review or dry-run workflows where appropriate.

What this means

The generated report may include file names, extension summaries, and Markdown headings from local audit evidence.

Why it was flagged

The script recursively samples files in a user-selected directory and reads Markdown headings for the generated report. This is purpose-aligned for evidence assembly, but local evidence folders may contain sensitive names or contents.

Skill content
for path in root.rglob("*") ... text = read_text(p) ... headings.append((p.name, line.strip()))
Recommendation

Point the skill at a narrow evidence folder, avoid broad home or company directories, and redact sensitive material before sharing generated reports.