Sha Tool
Analysis
This appears to be a simple local SHA-256 hashing utility with no evidence of network access, credential use, persistence, or destructive behavior.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
sha-tool [options] <algorithm> <file>
The documented command and multi-algorithm interface are not matched by the provided manifest, which only includes a small `scripts/sha256.py` implementation. This may affect usability or provenance clarity, but does not show malicious behavior.
data = open(sys.argv[1], 'rb').read() if sys.argv[1:] else sys.stdin.buffer.read()
The script reads a file path supplied on the command line or data from stdin, which is expected for a hashing utility and is not paired with network transmission or mutation.
