SAFE-Fuzzer

ReviewAudited by ClawScan on May 10, 2026.

Overview

SAFE-Fuzzer appears to be a legitimate sandbox-only testing skill, but it can drive subagent, file, shell, and network activity while probing other skills.

Install and run this only in a locked fuzzer sandbox, not on a normal host workspace. Keep real credentials and sensitive files out of the test environment, because the skill is designed to exercise target workflows that may involve commands, file access, and network activity.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A target skill being tested may run commands, touch files, or make network requests during fuzzing, so the sandbox boundary is important.

Why it was flagged

The fuzzer may deliberately cause the target skill to perform file, shell, and network actions; this is central to its purpose and is explicitly constrained to the sandbox.

Skill content
The worker executes the target's requested steps inside the sandbox and reports concrete file, shell, and network behavior.
Recommendation

Run only in the documented locked fuzzer sandbox, avoid real secrets or important files in the workspace, and review the generated report for any unexpected target behavior.

What this means

Information from the target skill and fuzzing probes may be shared with a worker subagent during the run.

Why it was flagged

The skill uses a parent/worker agent pattern, so probe instructions and observations are passed between sessions. The artifacts scope this to one child session for the fuzzing run.

Skill content
Spawn a worker subagent via `sessions_spawn`. Send probe-cycle instructions via `sessions_send`.
Recommendation

Keep the fuzzing workspace free of real secrets, and use the skill only where worker sessions are expected and sandboxed.

What this means

The registry may not automatically check that the sandbox image and tools needed for testing are present.

Why it was flagged

The README documents runtime prerequisites and a sandbox image expectation, while the registry metadata lists no required binaries or install spec. This is disclosed setup guidance, but users must verify the environment themselves.

Skill content
Use `openclaw-sandbox-common:bookworm-slim` or an equivalent custom image with `node`, `npm`, `python3`, `git`, `curl`, and `jq`.
Recommendation

Use a trusted sandbox image, verify the listed tools are available inside the sandbox, and avoid running the fuzzer setup on the host environment.