env-secrets-manager

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A poisoned or malformed secret value could cause commands to run on the user's machine or in CI while the user is only trying to load environment variables.

Why it was flagged

The documented secret-loading workflow uses shell eval on data returned from a secret manager. Secret names or values containing shell metacharacters could be interpreted as commands when this is run.

Skill content
eval $(vault kv get -format=json secret/myapp/prod | jq -r ...)
Recommendation

Do not use eval for secret-manager output. Prefer provider-native run/injection commands, SDK-based loading, or a carefully quoted env-file workflow that validates variable names and treats values as data.

What this means

A scan intended to find secrets could accidentally further expose those secrets to logs or the agent transcript.

Why it was flagged

The secret scanning script prints matched lines from staged changes, which can include the actual secret values. In an agent-driven workflow, those values may enter terminal logs, CI logs, or conversation context.

Skill content
echo "$matches" | head -5
Recommendation

Redact matched values by default, show only file names and line numbers when possible, and avoid pasting real secret scan output into shared chats or tickets.

What this means

If run with overly broad tokens or cloud roles, the workflow can read or modify important application secrets.

Why it was flagged

The skill documents use of privileged secret-manager credentials and also includes AWS SSM decryption/write examples. This is expected for the stated purpose but gives access to sensitive production secrets.

Skill content
export VAULT_TOKEN="$(vault login -method=oidc -format=json | jq -r '.auth.client_token')"
Recommendation

Use least-privilege roles, scope tokens to the needed app/environment, avoid sharing command output, and require human approval before production secret writes or rotations.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Future commits may be blocked or existing hooks may be overwritten if the hook is installed without review.

Why it was flagged

The optional hook installer creates an executable pre-commit hook that will run on future commits. This is disclosed and purpose-aligned, but it is persistent local behavior.

Skill content
HOOK_PATH=".git/hooks/pre-commit" ... chmod +x "$HOOK_PATH"
Recommendation

Review the hook before installing, back up any existing pre-commit hook, and prefer a team-managed pre-commit framework configuration.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

Running these commands incorrectly can disrupt collaborators, branches, and repository history.

Why it was flagged

The rotation playbook includes repository history rewriting and force-pushing all branches. The artifact warns to coordinate with the team, so this is disclosed, but the blast radius is high.

Skill content
git filter-repo --path-glob "*.env" --invert-paths ... git push origin --force --all
Recommendation

Treat history rewrite and force-push steps as manual incident-response actions only; get team approval, create backups, test on a clone, and document recovery steps.