Whoami Tool Check

PassAudited by ClawScan on May 16, 2026.

Overview

The skill appears low-risk and only includes a simple username-printing script, but its documentation advertises broader audit features that are not implemented in the provided code.

This skill does not show malicious behavior in the provided artifacts. However, its documentation is much broader than its included Python script, so treat it as a simple username utility unless you independently verify that the installed `whoami-tool-check` command actually supports the advertised audit options.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The tool may not perform the security audit its documentation describes, so relying on it could give an incomplete view of user privileges.

Why it was flagged

The included code only prints the current username, while the documentation advertises wider audit features such as sudo checks, role checks, capabilities, and JSON output. This is a capability mismatch users should notice.

Skill content
try: print(pwd.getpwuid(os.getuid())[0])
except: print(os.getenv('USER', 'unknown'))
Recommendation

Verify the installed command and test each advertised option before using this skill for security decisions.

What this means

If fully implemented, the skill would reveal local account and privilege details such as groups, sudo status, shell, and home directory.

Why it was flagged

The documented purpose includes inspecting local identity and privilege information. This is expected for the stated function, but it touches permission-boundary information.

Skill content
verify sudo/root access, check group membership for specific capabilities, and audit user-level access
Recommendation

Use it only in environments where local account and privilege information can be inspected, and confirm the output before sharing it.