杠精 Gangjing

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill is purpose-aligned as a red-team reviewer, but it can materialize and run a local attack harness with risky payloads against your workspace, sometimes based on an interpreted “strong claim” rather than a fresh explicit approval.

Install only if you want an aggressive red-team reviewer. Before allowing code attacks, confirm each run explicitly, use a disposable sandbox, avoid repositories with secrets or live service credentials, and review any generated .gangjing-tmp harness and results files.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Simply asserting that code is safe could lead the agent to run local code and generated attack harnesses, which may have side effects in the workspace.

Why it was flagged

This allows script execution not only after an explicit test request, but also after the skill interprets a strong claim about the current workspace code; the same artifact discloses that the attack engine imports and executes target module top-level code.

Skill content
只有在用户**明确要求测试代码**,或对**当前工作区代码**做 "绝对没问题"这类强断言时,才允许升级到脚本执行。
Recommendation

Require a fresh, explicit user confirmation before any harness creation or command execution, and run only inside a sandbox, container, VM, or disposable working tree.

What this means

A red-team run against non-isolated code could read sensitive local files, damage data, or stress the machine if the target code mishandles these inputs.

Why it was flagged

These payloads are intended as adversarial test inputs, but if they are sent into vulnerable code connected to a real shell, database, filesystem, or service, they could trigger harmful actions.

Skill content
cmd_payloads = ["; ls -la /etc/passwd", "| cat /etc/shadow", ... "file.txt; rm -rf /"]
Recommendation

Use harmless canary payloads by default, require sandboxing for destructive payload classes, and clearly separate demonstration payloads from payloads that may affect real systems.

What this means

Static package review may appear code-free, but the skill can still create executable files in the workspace during use.

Why it was flagged

The executable attack harness is embedded as a markdown template and materialized at runtime, so users should treat the template content as runnable code even though the package has no normal code files or install script.

Skill content
如果当前分发包没有 `scripts/` 目录,就把这里的模板代码写到当前工作区的临时文件里再运行。
Recommendation

Inspect the template harness before first use, keep generated files in a clearly named temporary directory, and delete them after testing.