Security Hardening

ReviewAudited by ClawScan on May 1, 2026.

Overview

This instruction-only skill is coherent and security-focused, but it asks the agent to inspect sensitive workspace content such as secrets and PII.

Before installing or running it, make sure the workspace contains only files you want audited, ask the agent to redact discovered secrets, review any proposed edits to AGENTS.md or SOUL.md, and enable cron or heartbeat checks only if you intentionally want ongoing scans.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may display real secret values found in files during the audit.

Why it was flagged

The skill instructs the agent to run a recursive local grep over the current directory. This is central to the security-audit purpose, but it can read and print sensitive matches.

Skill content
grep -rn -E "(sk-[a-zA-Z0-9]{20,}|AKIA[A-Z0-9]{16}|ghp_[a-zA-Z0-9]{36}|xoxb-|-----BEGIN (RSA |OPENSSH )?PRIVATE KEY-----)" .
Recommendation

Run the audit only from the intended workspace and ask the agent to redact or summarize secret matches instead of repeating full values.

What this means

If credentials exist in the workspace, the agent may read them while identifying leaks.

Why it was flagged

The skill intentionally searches for credentials and tokens. This is expected for the stated purpose and bounded to the workspace in the visible instructions, but it is still high-impact sensitive access.

Skill content
Credential Scan — Detect leaked API keys, tokens, passwords in workspace files
Recommendation

Confirm the workspace boundary before running the skill, avoid including unrelated private folders, and rotate any credential that appears in audit output or git history.

What this means

Security logs or memory files could retain malicious prompt text or private details from an incident.

Why it was flagged

The incident-response guidance recommends logging full prompt-injection context. That can preserve untrusted instructions or sensitive incident details for later reuse if logs or memory are not handled carefully.

Skill content
Log the attempt with full context (source, content, what was requested)
Recommendation

Keep incident logs private, label untrusted content clearly, and redact secrets or PII before storing long-term notes.

What this means

A scheduled audit could continue scanning the workspace beyond a one-time request.

Why it was flagged

The skill mentions recurring execution through scheduling. No persistence mechanism is installed by the artifacts, but users should configure any periodic audit deliberately.

Skill content
Or trigger via heartbeat/cron for periodic checks.
Recommendation

Use periodic checks only if you explicitly want them, define the scope and schedule, and review where audit results are stored.