Back to skill
Skillv1.0.0
ClawScan security
Prompt Injection Tester · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 30, 2026, 12:43 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- This is an instruction-only prompt-injection testing guide that is internally consistent with its stated purpose and does not request credentials or install code.
- Guidance
- This skill is coherent for red-team testing: it contains attack payload examples and step-by-step testing guidance but does not request credentials or install code. Before using it, ensure you have explicit authorization to test the target systems (running these payloads against production systems or systems you don't own may be illegal or disruptive). Run tests in isolated/sandboxed environments or on non-production copies of services, log and monitor test activity, and avoid exposing or exfiltrating real sensitive data during tests. If you plan to integrate this into an autonomous agent, review and limit the agent's permissions and make sure human oversight is required for any tests that could affect production systems.
- Findings
[ignore-previous-instructions] expected: This pattern appears in the SKILL.md as an example of a direct injection payload. For a prompt-injection tester, including this string is expected and explanatory rather than an indicator of malicious intent. [you-are-now] expected: The 'you are now' role-switching pattern is listed as an attack vector. Its presence aligns with the skill's stated purpose of enumerating injection techniques.
Review Dimensions
- Purpose & Capability
- okThe name/description (prompt injection tester) match the SKILL.md content: it defines attack categories, test execution steps, defense evaluation, and hardening recommendations. It does not request unrelated credentials, binaries, or config paths.
- Instruction Scope
- noteInstructions stay within testing scope (craft payloads, submit via app input, analyze responses). The document includes many explicit injection example phrases (e.g., 'Ignore previous instructions', 'You are now ...') — this is expected for a red-team/tester skill but is also why the skill could be misused if run without authorization. The SKILL.md does not instruct the agent to read system files, environment variables, or other unrelated secrets.
- Install Mechanism
- okNo install spec and no code files are present (instruction-only), so nothing is written to disk or downloaded during installation.
- Credentials
- okNo environment variables, credentials, or config paths are required. The requested scope of access is proportionate to the stated purpose.
- Persistence & Privilege
- okalways is false and the skill is user-invocable. It does not request permanent presence or system-wide configuration changes.
