Procmon

PassAudited by ClawScan on May 10, 2026.

Overview

Procmon is a coherent local process-monitoring skill with expected system-inspection commands and optional local logging, with no evidence of hidden network access, credential use, or destructive behavior.

Before installing, be aware that this skill can inspect local processes and listening ports, and its log command can save process details under ~/.procmon. The provided artifacts do not show hidden network transmission, credential handling, or destructive process-control actions.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

When used, the skill may show the agent process names, PIDs, resource usage, and listening ports on the machine.

Why it was flagged

The script invokes standard local diagnostic tools to enumerate processes and listening network ports. This is expected for Procmon's stated purpose, but it gives the agent visibility into local system activity.

Skill content
ps aux --sort=-%cpu ...; ss -tlnp ...; netstat -tlnp ...
Recommendation

Use it only in environments where sharing local process and port information with the agent is acceptable.

What this means

Process-monitoring results can remain on disk after the command finishes.

Why it was flagged

The log command persists process-monitoring output to a local file under the user's home directory. This is disclosed and purpose-aligned, but retained logs may contain local process information.

Skill content
LOG_DIR="${HOME}/.procmon" ... echo "[$ts] process=$name matches=$count" >> "$logfile"
Recommendation

Review or delete files in ~/.procmon if you do not want historical process-monitoring logs retained.