Srs
Analysis
This skill appears to be a security-research automation tool, but it also scans broad local workspace files, stores self-improvement state, and can execute undeclared helper scripts, so it should be reviewed before installation.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"script": "tasks/run_T1_architecture.py" ... process = subprocess.Popen(["python3", task["script"]], stdout=subprocess.PIPE, stderr=subprocess.PIPE)
The executor runs Python helper scripts from a tasks/ directory, but those scripts are not included in the supplied manifest or documented in SKILL.md, so their provenance and behavior cannot be reviewed from the artifact set.
task_id = sys.argv[2] ... handoff_file = self.handoff_dir / f"{task_id}.json" ... with open(handoff_file, 'w', encoding='utf-8') as f:A command-line task_id is used directly as part of a write path without normalization or path-segment validation.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
self.base_dir = os.path.expanduser("~/.openclaw/workspace/srs") ... project_dirs = [os.path.expanduser("~/ai-security/research"), os.path.expanduser("~/.openclaw/workspace/skills"), os.path.expanduser("~/.openclaw/workspace")] ... for root, dirs, files in os.walk(pdir): ... content = fp.read().lower()The module recursively reads local research and OpenClaw workspace files and stores capability data under ~/.openclaw/workspace/srs; SKILL.md does not clearly bound what is scanned, retained, or reused.
