Vulnerability Prioritizer
Analysis
This instruction-only skill is coherent for vulnerability prioritization, with purpose-aligned use of local scan commands and public vulnerability intelligence feeds.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
trivy image --format json $IMAGE 2>/dev/null ... grype $IMAGE -o json 2>/dev/null ... npm audit --json 2>/dev/null ... pip-audit --format json 2>/dev/null
The skill documents use of local scanner and package-audit tools, including a user-supplied image argument. These commands are purpose-aligned and read-oriented, but they can inspect local project or container dependency data.
curl -s "https://api.first.org/data/v1/epss?cve=CVE-2024-1234,CVE-2024-5678" ... curl -s "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json"
The skill relies on live public vulnerability intelligence feeds from FIRST EPSS and CISA KEV. This is expected for the stated purpose, but the accuracy and availability of those external data sources directly affect prioritization output.
curl -s "https://api.first.org/data/v1/epss?cve=..." | python3 -c " import json, sys data = json.load(sys.stdin)
The instructions include shell pipelines and inline Python snippets to parse JSON. This is central to the workflow and does not show downloaded code execution, but it is still local command execution.
Risk Score = CVSS_normalized × EPSS_weight × asset_multiplier × exploit_maturity
The workflow turns scanner data and asset assumptions into ranked remediation output. This is the purpose of the skill, but wrong inputs or assumptions can propagate into patch priority and SLA recommendations.
Ask about or infer the asset context ... 🚨 Critical Priority (patch within 24h)
The skill may infer asset context and uses urgent remediation language. This is normal for vulnerability triage, but users should verify inferred assumptions before trusting urgent patch timelines.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Compare current scan results against a previous baseline: - New vulnerabilities since last scan ... Track SLA compliance and flag overdue items.
The compare and SLA workflows depend on historical vulnerability context. That is purpose-aligned, but stale, incorrect, or overly trusted baseline data could affect future prioritization, and stored scan history may be sensitive.
curl -s "https://api.first.org/data/v1/epss?cve=CVE-2024-1234,CVE-2024-5678"
The EPSS lookup sends CVE identifiers to an external provider. This is expected for enrichment, but a CVE list can reveal part of an organization's vulnerability inventory.
