Back to skill
Skillv1.1.0
ClawScan security
FireAnt Stock Price Checker · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 20, 2026, 3:59 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill broadly matches its stated purpose (fetching FireAnt pages and extracting stock data) but contains a few inconsistencies and a suspicious hard-coded binary path that warrant review before installing or running.
- Guidance
- This skill appears to do what it says (fetch and parse FireAnt pages) but review before use: 1) Inspect and, if needed, modify the hard-coded agent-browser path in scripts/check_stock.py — it should call a trusted binary on PATH, not /Users/loc/Library/…; 2) Verify the source and integrity of the 'agent-browser' CLI before installing/running it; 3) Note the metadata mismatch (slug 'vietstock' vs registry 'fireant-stock') — this may indicate sloppy packaging; 4) Run the script in an isolated environment (sandbox/container) first, and open the snapshot output to ensure it contains only public web content; 5) If you need to permit autonomous invocation, be extra cautious because the script will execute a local binary. If you cannot verify the agent-browser binary's origin, do not run this skill.
Review Dimensions
- Purpose & Capability
- noteName/description (FireAnt stock/index lookup) aligns with the included script which opens FireAnt URLs and extracts prices/stats. Minor inconsistencies: _meta.json.slug is 'vietstock' while registry slug is 'fireant-stock', and SKILL.md mentions performing a Google search to find pages but the script simply constructs the FireAnt URL directly. The declared dependency on an 'agent-browser' CLI is reasonable for a headless browser workflow.
- Instruction Scope
- concernSKILL.md restricts actions to opening FireAnt pages via an Agent Browser and extracting data. However, the script invokes an external binary via subprocess.run using a hard-coded, user-specific absolute path '/Users/loc/Library/pnpm/agent-browser' rather than a generic 'agent-browser' on PATH. Executing arbitrary binaries at absolute paths is risky and non-portable; this is the main scope/behavior concern. The script does not access environment variables, other files, or external endpoints beyond the target site.
- Install Mechanism
- noteThere is no install spec. The skill expects an external 'agent-browser' CLI but does not provide an installation step or verified source for that dependency. This increases friction and risk because a user must supply/install the dependency themselves; verify you obtain agent-browser from a trusted upstream.
- Credentials
- okThe skill requests no environment variables, no credentials, and no config paths. The lack of requested secrets is proportionate to the stated purpose.
- Persistence & Privilege
- okalways is false and the skill does not request persistent or elevated privileges. It does not modify other skills or system configs. Autonomous invocation is allowed by default (disable-model-invocation=false) which is normal for skills and not, by itself, a concern.
