Safe Shell
Analysis
The skill is intended to be a read-only shell helper, but its included safety validator is broader than its “zero modification” claims and could approve unsafe shell patterns if used before execution.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
const ALLOWED_COMMANDS = [... 'ping', 'ifconfig', 'ip', ...]; ... trimmed.startsWith(cmd + ' ')
The validator approves any command that starts with an allowed word such as `ip`, rather than restricting exact read-only subcommands and arguments. If this result is trusted before an exec tool runs the command, broader shell operations could be treated as safe.
“零破坏风险:完全禁止任何修改、删除、执行危险操作” ... “命令链拦截:禁止 `| xargs`, `; && ||` 等命令链接”
The documentation makes very strong safety guarantees, but the included validator does not show comprehensive enforcement for command chaining, shell metacharacters, or all write paths.
Source: unknown; Homepage: https://github.com/your-repo/safe-shell
The source is not identified and the homepage appears to be a placeholder, which limits provenance review even though no dependency-install behavior is shown.
