TIA HW AUDITOR
Analysis
This skill has a coherent audit purpose, but it asks the agent to run external audit scripts that are not included or pinned while accessing sensitive engineering backups.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Run an external Openness script (e.g. `tia_hw_audit.bat field.zap18 master.zap18`).
The package is described as instruction-only and the manifest contains only SKILL.md and Scripts/README.md, yet the skill directs the agent to execute an external helper. The helper's source, path, version, and integrity are not provided in the reviewed artifacts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Mount or access network paths for NAS and engineering vault.
Access to NAS and engineering-vault locations is expected for comparing backups, but it is sensitive delegated access and the registry metadata does not declare required config paths or credentials.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Short JSON summary for the calling agent.
The skill is designed to return audit results to another agent. This is purpose-aligned, but the artifacts do not define which agent may receive the summary or how sensitive hardware/I/O change data is protected.
