SpecClaw
Analysis
SpecClaw is coherent for automating software development, but it can run shell commands, spawn coding agents, read files into prompts, and automatically commit or merge code, so it needs careful review before use.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
if ! eval "$test_command" >&2 2>&1; then ... if ! eval "$lint_command" ... if ! eval "$build_command"
The finalize step shell-evaluates command strings read from .specclaw/config.yaml, so configured test/lint/build values can execute arbitrary shell syntax.
sessions_spawn with context payload ... build.sh commit ... build.sh finalize ... For branch-per-change: checks out main/master, runs `git merge --no-ff`
The documented build flow chains spawned coding agents, git commits, and branch merging; the artifacts do not show a mandatory human approval step before merge.
automation: auto_mode: true cron: "0 2 * * *" ... Agent wakes up ... Runs: specclaw build add-dark-mode ... Spawns agents
The documentation describes an optional autonomous cron-style mode that can start builds and spawn agents without the user being actively present.
No install spec — this is an instruction-only skill. ... 13 code file(s): scripts/build-context.sh ... scripts/build.sh ... scripts/gh-sync.sh
The package is presented as instruction-only but includes bundled shell scripts that are central to the workflow.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
GitHub sync (if `github.sync` is true): Run `bash skill/scripts/gh-sync.sh create .specclaw <change>` to create a GitHub Issue
When enabled, the skill can create or update GitHub issues using the user's GitHub environment or CLI identity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
# Build context payload for a specific task — feeds the coding agent ... local full_path="$PROJECT_ROOT/$file" ... output+="$(cat "$full_path")"
The script reads file paths from task metadata and copies their contents into a coding-agent prompt, with no visible path containment or secret-file exclusion in this script.
patterns.md # Recurring pattern registry (cross-change) ... errors.md ... learnings.md
SpecClaw stores cross-change patterns, errors, and learnings that can later influence generated prompts and agent behavior.
