ClawHub Publish Doctor
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The `scripts/clawhub_publish_safe.sh` file directly passes unsanitized user-controlled arguments (skill path, slug, name, version, changelog) to the `clawhub publish` command. This creates a potential command injection vulnerability if the `clawhub` CLI or the underlying environment is susceptible to shell injection via its arguments (e.g., if it internally uses `eval` or `system()` without proper escaping). While the script's stated purpose is benign (to publish skills), this lack of input sanitization represents a significant security risk, allowing for potential arbitrary command execution if exploited. There is no evidence of intentional malicious behavior such as data exfiltration or persistence.
