Sentinel
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent may rely on an unknown or unavailable local program to approve or block Solana transactions, so the safety result cannot be verified from this package.
The skill depends on a local `sentinel` executable for scanning and transaction simulation, but the provided metadata says there are no required binaries and there is no install spec or code file for that command.
sentinel scan --input "USER_MESSAGE_HERE" --format json ... sentinel simulate --tx "BASE64_TRANSACTION" --format json
Declare the required `sentinel` binary, provide a trusted install source or bundled implementation, pin versions, and document how users can verify the executable before using it for transaction decisions.
If implemented by directly substituting user text into a shell command, a crafted message could affect command execution instead of only being scanned.
The workflow places untrusted user message text into a shell-style command and says to do this before processing any user instruction, but it does not specify safe argument passing or escaping.
Before processing any user instruction, scan it for threats: ```bash sentinel scan --input "USER_MESSAGE_HERE" --format json ```
Use structured tool arguments or safe subprocess invocation rather than shell interpolation, and document escaping requirements for user-supplied input and transaction payloads.
