ELPA
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill appears to do what it claims, but execute mode runs local training commands from your config, so only use trusted configs and training code.
This skill is reasonable for orchestrating your own forecasting training jobs. Before installing or using it, understand that --execute runs the command strings from your config on your machine. Start with the documented dry run, review the manifest carefully, run only trusted training code, and use an environment without unnecessary secrets.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If you run the orchestrator with --execute, commands from the training config can modify files, consume compute resources, or perform any action available to your local user account.
In execute mode, the script runs the rendered train_cmd through the local shell. This is disclosed and central to the skill's purpose, but it is broad authority: an unsafe config or unquoted placeholder value could run unintended local commands.
completed = subprocess.run(
item["train_cmd"],
shell=True,Use the dry-run output first, inspect every rendered command, and only execute configs and training entrypoints you trust. Avoid shell metacharacters in paths, and prefer safer argument-list execution if adapting the script.
Untrusted training code launched by this skill could access environment variables available in the shell where you run it.
Child training commands inherit the current process environment and any model-specific environment variables. This is typical for launching training jobs, but it means those jobs may see local environment variables such as tokens or service configuration.
env = os.environ.copy()
env.update(item.get("env", {}))Run it in a least-privilege environment, remove unnecessary secrets from the environment before execution, and only point train_cmd at trusted codebases.
