Runtime Attestation Probe

PassAudited by ClawScan on May 1, 2026.

Overview

This appears to be a coherent security-audit skill, but runtime probing should be limited to approved skills and controlled environments.

This skill looks suitable as an instruction-only security review aid. Before using it, decide exactly which skill and environment may be probed, avoid real production credentials or sensitive data unless necessary and approved, and treat any observed side effects from the target skill as potentially real.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used carelessly, probing an untrusted or high-impact skill could exercise that target skill's tools or side effects.

Why it was flagged

The skill's core workflow can involve executing or instrumenting another skill. That is coherent for a runtime probe, but users should ensure the target and environment are explicitly approved and contained.

Skill content
Runtime attestation probing tests the gap between declared and observed behavior by instrumenting actual execution and comparing it against the skill's attestation claims.
Recommendation

Run probes only against skills you are authorized to test, preferably in isolated or production-like test environments with clear limits on file, network, and account access.

What this means

Users have less external context for who maintains the skill or where its full project history lives.

Why it was flagged

The supplied metadata does not provide an upstream source or homepage. This is not a concrete unsafe behavior, especially because there is no install script or code file, but it limits provenance review.

Skill content
Source: unknown; Homepage: none
Recommendation

Prefer skills with clear upstream provenance when available, or review the provided SKILL.md carefully before enabling it.