Whoami Tool Check
PassAudited by ClawScan on May 16, 2026.
Overview
The skill appears low-risk and only includes a simple username-printing script, but its documentation advertises broader audit features that are not implemented in the provided code.
This skill does not show malicious behavior in the provided artifacts. However, its documentation is much broader than its included Python script, so treat it as a simple username utility unless you independently verify that the installed `whoami-tool-check` command actually supports the advertised audit options.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The tool may not perform the security audit its documentation describes, so relying on it could give an incomplete view of user privileges.
The included code only prints the current username, while the documentation advertises wider audit features such as sudo checks, role checks, capabilities, and JSON output. This is a capability mismatch users should notice.
try: print(pwd.getpwuid(os.getuid())[0])
except: print(os.getenv('USER', 'unknown'))Verify the installed command and test each advertised option before using this skill for security decisions.
If fully implemented, the skill would reveal local account and privilege details such as groups, sudo status, shell, and home directory.
The documented purpose includes inspecting local identity and privilege information. This is expected for the stated function, but it touches permission-boundary information.
verify sudo/root access, check group membership for specific capabilities, and audit user-level access
Use it only in environments where local account and privilege information can be inspected, and confirm the output before sharing it.
