Tar Tool

AdvisoryAudited by Static analysis on May 5, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Extracting an untrusted archive could overwrite project files, configuration files, or other local files accessible to the agent.

Why it was flagged

The code extracts all archive members into the current working directory without an explicit destination, path validation, extraction filter, or overwrite controls. Malicious tar archives can contain unsafe paths or links on some Python runtimes, which may cause files outside the intended directory to be written or overwritten.

Skill content
with tarfile.open(args.file, 'r:*') as t:
        t.extractall()
Recommendation

Only extract trusted archives in a temporary sandbox directory. The skill should implement safe extraction by validating member paths, rejecting absolute or parent-directory paths, using a safe extraction filter where available, and requiring user confirmation before overwriting files.

What this means

The agent may believe it created a compressed backup or used documented tar flags when the included implementation does not support those behaviors.

Why it was flagged

The documentation advertises tar-style flags and compression creation, but the included script only defines a positional archive path, optional files, and an `-x/--extract` flag, and opens new archives with mode `w` rather than compressed modes.

Skill content
Supports gzip, bzip2, and xz compression ... `-czf archive.tar.gz files`: Create gzip compressed
Recommendation

Verify the actual command behavior before relying on this skill for backups or distribution, and update the documentation or implementation so they match.