Skill Vetter Plus
Analysis
Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions); human review is required before treating this skill as clean.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
for root, _, files in os.walk(skill_dir): ... yield Path(root) / fname
The scanner recursively processes every file under the user-supplied path. This is expected for its purpose, but users should avoid pointing it at broad private directories.
"deep": ... "Use extended semgrep rules (requires semgrep)" ... "scan-batch"
The metadata advertises deep and batch scanning, while SKILL.md says these are not implemented and the included CLI only defines a path and --json option. This can create false expectations about coverage.
Detection strings stored as ASCII integer arrays to avoid literal matches in ClawHub's static code scanner. Decoded at runtime.
The encoded detection strings are disclosed and purpose-aligned for a scanner that searches for dangerous fragments, but they intentionally make simple literal static checks less straightforward.
