Angus Bounty Hunter

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill matches its smart-contract scanning purpose, but its scan script automatically installs dependencies from any target repository, which can run untrusted code on your machine.

Install or run this only in a sandboxed environment such as a container or disposable VM. The scanner's purpose is legitimate, but its default scan script may run npm or pip installation code from whatever repository you scan.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Scanning a malicious or compromised repository could run code on the user's machine, not just perform static analysis.

Why it was flagged

After cloning a user-supplied repository, the script automatically runs npm and pip installs. Those package managers can execute install scripts or setup code from untrusted target repositories and dependencies.

Skill content
[ -f "package.json" ] && npm install --silent 2>/dev/null || true
[ -f "requirements.txt" ] && pip3 install -r requirements.txt --quiet 2>/dev/null || true
Recommendation

Run this only in a disposable container or VM, or change the script to ask before installing dependencies, use locked dependencies, disable npm scripts where possible, and use a dedicated Python virtual environment.

What this means

A target repository can influence what third-party packages are installed and what setup code runs during scanning.

Why it was flagged

The workflow pulls arbitrary remote repository contents and then trusts that repository's dependency declarations. There is no artifact evidence of pinning, verification, sandboxing, or containment.

Skill content
git clone --depth 1 "$REPO_URL" 2>&1
...
[ -f "package.json" ] && npm install --silent 2>/dev/null || true
[ -f "requirements.txt" ] && pip3 install -r requirements.txt --quiet 2>/dev/null || true
Recommendation

Treat target repositories as untrusted supply-chain input. Prefer containerized scans, dependency lockfiles, no-script install modes, and explicit user approval before any package installation.

What this means

If the local LLM service is not trusted or is exposed to other users, vulnerability findings or project details could be visible to that service.

Why it was flagged

The triage script sends finding summaries to a local Ollama-compatible LLM endpoint. This is disclosed and purpose-aligned, but it is still a data flow to another local service.

Skill content
curl -s http://127.0.0.1:11434/api/generate \
    -d "{\"model\":\"deepseek-coder-v2:16b-lite-instruct-q5_K_M\",\"prompt\":\"$PROMPT\",\"stream\":false}"
Recommendation

Use only a trusted local Ollama instance, confirm it is bound to localhost as expected, and avoid triaging sensitive private code on shared machines.