Dicom Anonymizer

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is mostly aligned with DICOM anonymization, but it overstates HIPAA-grade privacy while preserving image pixels unchanged and creating potentially sensitive audit records.

Review carefully before using with real patient data. Treat the output as requiring validation for burned-in text, dates, private tags, and other residual PHI; protect audit logs; and pin/install dependencies in a trusted environment.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could share supposedly anonymized medical images while patient identifiers remain visible in the image data.

Why it was flagged

The skill claims compliance-grade de-identification while explicitly preserving pixel data unchanged; DICOM images can contain burned-in identifiers or other PHI in the pixels, so this assurance may be stronger than the artifacts support.

Skill content
- **HIPAA Safe Harbor Compliant**: Meets de-identification standards for research use ... Image pixel data (7FE0,0010) preserved unchanged
Recommendation

Use this only as one de-identification step, validate outputs manually or with a trusted DICOM de-identification workflow, and do not rely on the HIPAA/compliance claim without independent review.

What this means

Audit logs may reveal sensitive file names, patient-linked identifiers, or research linkage information even when the DICOM output is anonymized.

Why it was flagged

The optional audit log stores persistent metadata about original files and patient-ID-derived hashes; paths or hashes can be sensitive or linkable.

Skill content
"input_file": "/path/to/original.dcm", "output_file": "/path/to/anonymized.dcm", "original_patient_id_hash": "sha256:abc123...", "pseudonym": "ANON_0001"
Recommendation

Store audit logs in a protected location, avoid patient identifiers in file paths, review log contents before sharing, and delete logs when no longer needed.

What this means

The exact code installed from package repositories may vary by environment, which can affect reproducibility and security review.

Why it was flagged

The dependency file lists unpinned Python packages, so installations may resolve to different versions over time.

Skill content
dataclasses
pydicom
Recommendation

Pin dependency versions, install from trusted package indexes, and consider using a lockfile or isolated virtual environment.

What this means

A mistaken input/output path could process the wrong files or produce outputs that are assumed safe without review.

Why it was flagged

The skill supports recursive batch processing of local DICOM directories, which is expected for its purpose but can affect many files if paths are chosen incorrectly.

Skill content
python scripts/main.py --input /path/to/dicom/folder/ --output /path/to/output/ --batch
Recommendation

Run on copies of data, use a separate output directory, keep overwrite disabled unless necessary, and inspect a sample of outputs before sharing.