clawsec-feed
Analysis
This appears to be a security advisory feed with documented install/update instructions; the main thing to review is its remote-download installation flow and how advisory data may influence your agent.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
LATEST_TAG=$(curl -sSL --retry 3 --retry-delay 1 https://api.github.com/repos/prompt-security/ClawSec/releases | jq -r '[.[] | select(.tag_name | startswith("clawsec-feed-v"))][0].tag_name')The standalone install flow fetches the latest release metadata and artifacts from GitHub rather than using a pinned local artifact. The instructions also include checksum validation and provenance warnings, so this is a disclosed supply-chain consideration rather than suspicious behavior.
Required runtime for standalone installation: `bash`, `curl`, `jq`, `shasum`, `unzip`
The skill documents shell-based setup commands for downloading, verifying, and extracting the package. These commands are user-directed and central to standalone installation, with no evidence of hidden automatic execution.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
**Community-Driven** - Advisories contributed and reviewed by the security community
The package provides external advisory data intended for AI agents to consume and act on. That is the stated purpose, but community-driven security content should be treated as advisory context, not unquestioned authority.
