Back to skill
Skillv1.0.0
ClawScan security
Key Rotation Planner · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 29, 2026, 11:45 PM
- Verdict
- suspicious
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's purpose (planning key rotations) is plausible, but the runtime instructions expect access to secrets managers and CLI tools (aws, vault, rg, python3) while the skill metadata declares no required binaries or credentials — a clear mismatch that needs clarification before installation.
- Guidance
- Do not install or run this skill until the author clarifies dependencies and privileges. Specifically: (1) Ask the publisher to declare required binaries (aws, vault, rg, python3) and required environment variables (e.g., AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY or an IAM role, VAULT_ADDR/VAULT_TOKEN). (2) Verify the minimum permissions needed — prefer read-only, least-privilege IAM roles and limited Vault policies that only list metadata, not secrets values. (3) Confirm how calendar/ticket reminders are created (which API/endpoints) and require explicit, auditable actions before any external posting. (4) Run the scanning steps in a safe, non-production environment first (or with logging/audit enabled) so secret exposure is controlled. If the publisher updates the metadata to declare the exact binaries and credential scopes, and the runbook limits actions to non-exfiltrating operations (or uses safe read-only discovery), the incoherence would be resolved and the assessment could be upgraded.
Review Dimensions
- Purpose & Capability
- concernThe stated purpose (inventorying and rotating keys) matches the SKILL.md content, but the skill's metadata declares no required binaries or credentials even though the instructions call aws CLI, HashiCorp Vault, ripgrep (rg), and python3. Legitimate operation of this skill would normally require those tools and access credentials.
- Instruction Scope
- concernSKILL.md tells the agent to run commands that enumerate repositories for secrets and to call aws secretsmanager and vault list operations. These instructions access sensitive data (secret listings, potential hardcoded keys) and also delegate undefined actions (creating calendar events or tickets) without specifying endpoints. The instructions grant broad discretion to access secrets managers and repository contents which is outside what metadata declares.
- Install Mechanism
- noteThere is no install spec (instruction-only), which reduces disk-write risk. However, the instructions rely on several external binaries (rg, aws, vault, python3) that are not declared as required. The lack of declared dependencies is an inconsistency to fix — it doesn't introduce a direct install URL risk but is misleading about what the agent will actually execute.
- Credentials
- concernSKILL.md implicitly requires access to cloud and secrets-manager credentials (AWS credentials or a role, VAULT_ADDR/VAULT_TOKEN or similar) to list secrets and evaluate rotation status, yet the skill metadata lists no required environment variables or primary credential. This is disproportionate and may cause the agent to attempt credentialed operations without the user being informed.
- Persistence & Privilege
- noteThe skill is not always-enabled and is user-invocable (normal). It does not request persistent installation or system-wide configuration. However, because the instructions can access sensitive secrets if run, you should avoid granting autonomous invocation or broad credentials without review.
