Ralph Ultra Security Audit
Analysis
No hidden code or exfiltration is evident, but the skill directs broad secret and infrastructure auditing and persistent report writing, so it needs careful review before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Attack surface — endpoint enumeration, auth mapping, rate limits, exposed ports... Hidden systems — undeclared services, cron jobs, orphan configs, Docker networks
These instructions cover broad system and network discovery. The skill does not state allowed targets, read-only limits, scan intensity, or when to ask the user before touching infrastructure-related areas.
- **NEVER skip iterations** ... **CONTINUE**: IF iteration <= 1000 GOTO Step 1
The skill sets a rigid 1,000-iteration stopping condition. This is disclosed as part of the deep-audit purpose, but users should notice that it may keep the agent working for hours unless interrupted.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
- **251-300:** Secret detection (API keys, passwords, git history)
The skill explicitly directs the agent to look for credentials in files and history. That is aligned with a security audit, but the artifacts do not define target scope, redaction rules, or safe handling for discovered secrets.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
**SAVE**: Every 50 iterations, update `.ralph-report.md`
The skill creates persistent audit output. Because the same workflow includes detailed findings, exploit information, and secret-detection checks, the report may retain sensitive security data without stated redaction, retention, or path controls.
