Skill
Analysis
Sandboxer is upfront about being a power-user tmux dispatcher, but it gives an agent broad unauthenticated server, terminal, workspace, and persistent-session control that merits careful review.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`GET /api/create?type=T&dir=D` | Spawn session ... `GET /api/send?session=S&text=T` | Send keystrokes ... `GET/POST /api/workspace/W/file/PATH` | Read/write workspace files ... `POST /api/auto-commit?workspace=W` | Commit workspace changes
The documented API lets the agent create interactive sessions, send arbitrary input, mutate workspace files, and commit changes; these are broad high-impact operations without documented approval or scoping controls.
Session types: `claude`, `bash`, `lazygit`, `gemini`, `opencode` ... `GET /api/create?type=T&dir=D` | Spawn session ... `GET /api/kill?session=S` | Kill session
The skill enables spawning multiple autonomous or interactive tmux sessions, including other coding agents and shells, but does not document time limits, quotas, or default cleanup behavior.
No install spec — this is an instruction-only skill.
The package contains only instructions for using a powerful localhost service; the artifacts do not provide the Sandboxer service code or installation provenance to review.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Sandboxer gives agents full access to tmux sessions, workspace files, and terminal output on your server. Intended for dedicated AI machines where agents run with root access. ... No auth needed from localhost.
The skill explicitly relies on unauthenticated localhost access to a service that can operate with root-level authority over server terminals and workspace files.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`AGENTS.md` ... `SOUL.md, USER.md, TOOLS.md` ... `MEMORY.md` ... `memory/YYYY-MM-DD.md` ... `Always read CLAUDE.md / AGENTS.md in both workspace AND repo before dispatching work to a session`
The workflow intentionally reads persistent agent rules and memory-like workspace files before dispatching work, which is purpose-aligned but means those files can strongly influence future spawned sessions.
`POST /api/create` accepts JSON body with `notify_url` — gets called when session finishes.
The API can call a supplied notification URL when a spawned session completes, creating an external callback path whose payload and destination constraints are not described.
