Rapid Prototyper

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill is coherent for fast MVP building, but users should review cloud credentials, package installs, analytics, database changes, and deployment commands before running them.

This skill appears safe to install as an instruction-only prototyping guide. Before following its workflow, review any npm/npx commands, use sandbox or test cloud accounts, keep secrets out of source control, confirm database changes, and prefer preview deployments before publishing a prototype to production.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the setup may execute newly downloaded package code and install tools on the user's machine.

Why it was flagged

The setup relies on downloading and running npm ecosystem tooling, including latest-tag packages and a global CLI install. This is expected for bootstrapping a Next.js/Vercel prototype, but it introduces normal package provenance risk.

Skill content
npx create-next-app@latest my-app ... npx shadcn@latest init ... npm install -g vercel
Recommendation

Review commands before running them, prefer pinned versions for repeatable builds, and use trusted package registries and a disposable prototype environment when possible.

What this means

A user could unintentionally change a cloud database schema or publish a prototype publicly if these commands are run without review.

Why it was flagged

The reference workflow includes commands that can mutate a remote database schema and publish the app to production. This fits the MVP-building purpose, but these are higher-impact actions.

Skill content
npx prisma db push   # push schema to Supabase ... vercel --prod   # production deploy
Recommendation

Confirm before database pushes or production deploys, use preview/staging projects first, and verify environment variables and target accounts.

What this means

Leaked or over-privileged credentials could expose the prototype's database or authentication configuration.

Why it was flagged

The generated app setup requires database and Clerk authentication credentials. The shown values are placeholders and the credential use is purpose-aligned, but these secrets grant account and data access.

Skill content
DATABASE_URL=postgresql://postgres:password@db.xxx.supabase.co:5432/postgres ... CLERK_SECRET_KEY=sk_test_xxx
Recommendation

Use test credentials, do not commit .env.local files, scope permissions narrowly, and rotate keys if they are exposed.

What this means

Prototype user activity or feedback-related data may be collected by analytics providers depending on how the app is implemented.

Why it was flagged

The skill instructs adding third-party analytics and action logging to generated prototypes. This is normal for MVP validation, but it creates an external data flow that users should configure deliberately.

Skill content
Add Vercel Analytics or PostHog from day one
- Log key actions
Recommendation

Disclose analytics to testers, avoid logging sensitive data, configure retention and privacy settings, and disable telemetry if it is not needed.