scellrun
PassAudited by VirusTotal on May 7, 2026.
Overview
Type: OpenClaw Skill Name: scellrun Version: 1.3.3 The skill bundle provides detailed instructions for an AI agent to use 'scellrun', a bioinformatics CLI tool for single-cell RNA sequencing analysis. The documentation (SKILL.md) includes robust guidance on environment hygiene, remote execution via SSH, and transparent reporting of analysis decisions using a structured JSONL log. It specifically includes security-conscious advice for handling API keys (e.g., using HISTCONTROL to avoid shell history leaks) and emphasizes user consent for automated fixes. No evidence of data exfiltration, malicious execution, or unauthorized persistence was found.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent could run commands or change software environments on a remote data system beyond what the user expected.
This instructs broad remote shell use, environment setup, and command execution, but the visible artifact does not define host/path limits, approval checkpoints, or containment for changes.
You will ssh to wherever the data lives, set up an env, run scellrun, read the artifacts it writes
Before use, require explicit confirmation of the target host, data path, working directory, virtual environment, and any install or force/re-run commands.
A user may unintentionally delegate access to sensitive research or clinical systems without a clear credential boundary.
SSH access normally relies on user accounts or keys, but the registry declares no primary credential and the visible instructions do not bound which credentials or privileges the agent may use.
You will ssh to wherever the data lives
Use a least-privilege account, avoid shared admin credentials, and have the agent ask before connecting to any remote system.
The user could install or upgrade an external package that was not reviewed in these artifacts.
The skill depends on an external package install/upgrade, while the supplied artifacts show no install spec or package pinning. This is purpose-aligned but leaves provenance verification to the user.
Tell the user `pip install --upgrade scellrun` and re-run.
Verify the scellrun package source, pin an expected version, and install it in an isolated environment.
If an override file is tampered with or reused without review, future analysis conclusions could change.
The workflow persists review overrides that can later be consumed by `analyze --apply-overrides`, so stored files can influence future labels, exclusions, and thresholds.
`scellrun review` (Flask UI on 127.0.0.1 for human-in-the-loop overrides; saves `<run-dir>/06_views/review_overrides.json`)
Protect run directories, review override files before applying them, and keep provenance for any human edits.
