Back to skill
Skillv3.0.1

ClawScan security

Password · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 19, 2026, 9:54 AM
Verdict
Benign
Confidence
medium
Model
gpt-5-mini
Summary
The skill's files and instructions match a local password utility: generation, strength/entropy analysis, batch generation, diceware, PINs, and a k‑anonymity breach check; nothing in the provided code indicates covert exfiltration or unrelated privileges.
Guidance
This skill appears to be a local password utility and is internally consistent with that purpose. Before installing or using it: (1) inspect the remainder of scripts/script.sh (the provided content was truncated) to ensure it does not log or transmit generated or provided passwords to unexpected endpoints; (2) be aware it will create ~/.local/share/password-tool — check that it doesn't store plaintext secrets you don't want kept; (3) ensure openssl and common CLI tools (od, awk, sort, grep) are available on your system (SKILL.md only mentions curl); (4) breach checking uses Have I Been Pwned with k‑anonymity (only the first 5 chars of the SHA‑1 hash should be sent) — if you want to avoid any network calls, avoid the check-leak command. If you want higher assurance, run the script in a contained environment (VM/container) and review the full script source prior to use.

Review Dimensions

Purpose & Capability
okThe name/description match the included scripts: the tool generates passwords, measures strength/entropy, and checks breaches. Requested tools (curl) and use of /dev/urandom, openssl, and common shell utilities are consistent with these functions.
Instruction Scope
noteSKILL.md instructs the agent to run scripts/script.sh for all commands, which is expected. The script performs local computation and an optional network call to Have I Been Pwned using k‑anonymity, which is appropriate for breach checking. Two minor scope notes: SKILL.md lists only 'curl' as a requirement but the script uses openssl and other common CLI utilities (od, awk, grep, sort) which are not declared; the script creates a data directory (~/.local/share/password-tool) — the manifest doesn't explain what (if anything) is persisted there. Review the remaining (truncated) part of the script to confirm it doesn't write sensitive data unencrypted or transmit it to unexpected endpoints.
Install Mechanism
okNo install spec (instruction-only with a bundled script) — nothing is downloaded from external URLs during install. This is low-risk compared to remote downloads.
Credentials
noteThe skill requests no environment credentials (none declared). It does access $HOME and creates ~/.local/share/password-tool to store data; this is plausible for a local tool but users should confirm what is stored. Network access (curl to api.pwnedpasswords.com) is limited to the breach-check feature and uses k‑anonymity; this aligns with the stated purpose.
Persistence & Privilege
okalways is false and the skill is user-invocable only. It does not request broad platform privileges or modify other skills. Creating a per-user data directory is normal for a CLI utility, but review what it stores.