Unexpand Tool

AdvisoryAudited by Static analysis on May 6, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A piped text input could be misinterpreted as a local file path, causing the tool to fail or display the contents of an unintended file.

Why it was flagged

When no filename argument is supplied, the script reads stdin and uses that text as a file path, while SKILL.md documents piped text input. This is more likely a bug than malicious behavior, but users should avoid piping untrusted content.

Skill content
open(sys.argv[1] if len(sys.argv)>1 else sys.stdin.read()).read()
Recommendation

Use explicit intended filenames and fix stdin handling before relying on piped-input workflows.

What this means

The skill may not run as documented, or a local command with the same name could be used instead of the included script.

Why it was flagged

The documentation references an unexpand-tool command and the manifest includes scripts/unexpand.py, but no install mechanism declares how that command is provided.

Skill content
No install spec — this is an instruction-only skill.
Recommendation

Verify the command path or wire the included script explicitly before use.