Sysinfo Tool

PassAudited by ClawScan on May 4, 2026.

Overview

The provided artifacts look like a straightforward local system-information tool; it may display host and process details, but shows no evidence of exfiltration, persistence, or credential use.

This appears safe for local diagnostics, but system-info output can include hostnames, disk layout, network interface names/statistics, and process command lines. Review the output before sharing it with others, and prefer specific flags or brief output if you only need limited details.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can collect and display local system inventory and process information in the conversation.

Why it was flagged

The script invokes fixed local OS commands to collect disk and process information. This is expected for a system diagnostics tool and is not shell-expanded or user-controlled, but users should know local commands are run.

Skill content
subprocess.run(['df', '-B1', '-T'], capture_output=True, text=True, check=True) ... subprocess.run(['ps', 'aux', '--sort=-pcpu'], capture_output=True, text=True)
Recommendation

Use the tool only when you want diagnostics, and review the output before sharing it externally.

What this means

Users have less external context about who maintains the skill or how the command is installed and invoked.

Why it was flagged

The skill has limited provenance and no install specification. The included visible source is coherent and the static scan is clean, so this is a transparency note rather than a security concern.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Install only if you are comfortable with the provided source and limited provenance; verify the command path if it does not run as expected.