Back to skill
Skillv1.0.0
ClawScan security
the-install-sandbox · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 28, 2026, 8:59 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's purpose (sandbox + scanner) matches its code, but there are multiple implementation inconsistencies and overstated claims (isolated tmpfs, network-off, time limits, and a missing install method) that mean the package is not what its README/SKILL.md promise without further review.
- Guidance
- This package appears to implement a scanner and sandbox and includes sensible detection rules, but there are notable mismatches between what the docs promise and what the code implements. Before trusting it as your gating tool: - Do not enable any auto-approve or automatic actions based solely on its output until you confirm its behavior. - Manually review or run the package locally: run its tests and exercise scan/scan-local flows (use copy_local) to verify behavior. The CLI references sandbox.install_skill which is missing — remote fetch/install may not work. - The README claims an isolated tmpfs sandbox, network-off, size/time limits, and namespaces, but Sandbox.create() only creates a directory; the implementation does not enforce tmpfs, network blocking, or timeouts. If you expect those guarantees, request or review code that mounts tmpfs, uses namespaces, or enforces resource limits. - Treat reports as advisory. Consider running scans inside a real isolated VM or container while you validate the sandboxing features. - If you want to use it in CI, require manual approval (no auto-approve) until the missing/mismatched behaviors are resolved. What would change this assessment to benign: an updated release where the code actually implements the claimed isolation (tmpfs namespace/mount, network-blocking, timeouts), the CLI's install_skill is implemented (or removed), and the registry metadata correctly reflects that the package contains code (not instruction-only).
- Findings
[prompt-injection-in-doc] expected: A prompt-injection phrase (e.g., 'ignore previous instructions') was detected in the README/SKILL.md. This is used as a detection example in the README and scanner patterns; it's expected in documentation and not an attempt to override this evaluation. Still, documentation examples can trigger naive scanners.
Review Dimensions
- Purpose & Capability
- concernName/description and the included scanner/sandbox code broadly align: patterns, scanner, reporter, and policy exist and are coherent for a pre-install security scanner. However README/SKILL.md repeatedly claim a true tmpfs jail (50MB), network-off, time-limited sandbox and a remote fetch/install step. The Sandbox.create() implementation merely makes a directory under the system temp dir and does not mount tmpfs, enforce size limits, drop network, or implement timeouts/namespaces. Additionally, the CLI calls sandbox.install_skill(slug, sandbox_id) but Sandbox has no install_skill method. Also the registry metadata said 'instruction-only' yet the package contains setup.py and full source—this mismatch should be clarified.
- Instruction Scope
- noteSKILL.md and README only instruct scanning and viewing reports; they don't ask the agent to read unrelated user files or exfiltrate data. The CLI however describes a 'fetch remote skill' flow which would require network access and relies on a Sandbox.install_skill implementation that is missing. A prompt-injection pattern was detected in the documentation/examples (likely as a detection example), which could be confusing but is not an instruction to exfiltrate data.
- Install Mechanism
- noteNo install spec in the registry metadata (instruction-only), but a standard setup.py is present and README shows pip/git install options. There are no downloads from arbitrary URLs or extract-from-unknown-host operations. Dependencies are minimal (typer, colorama). The mismatch between 'instruction-only' metadata and present packaging code is worth asking about but not inherently unsafe.
- Credentials
- okThe skill declares no required environment variables, credentials, or config paths. The code scans for many credential patterns (as expected for a scanner) but does not itself request or try to read environment credentials. No disproportionate secret access is requested.
- Persistence & Privilege
- okThe skill does not request always:true or elevated persistent privileges. It writes reports and policy under the user's ~/.config/the_install_sandbox and uses a temp sandbox dir — this is reasonable for a scanner. It does not attempt to modify other skills or system-wide agent settings.
