JSON Processor

PassAudited by ClawScan on May 15, 2026.

Overview

This appears to be a local JSON utility that processes user-selected files, with no evidence of network access, credentials, persistence, or hidden behavior in the provided artifacts.

This skill looks safe for normal local JSON processing. Before installing or using it, remember that JSON files can contain secrets or private data, so only point it at files you intend the agent to read or rewrite.

Findings (1)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may read and display JSON file contents or write a transformed/formatted JSON file when asked.

Why it was flagged

The skill is designed to run a local Python command over user-provided JSON files and can write an output file. This is expected for a JSON processor, but it is still a local file-processing capability the user should scope deliberately.

Skill content
python3 skills/json-processor/scripts/json_processor.py format data.json --indent 2 ... python3 json_processor.py format data.json --output pretty.json
Recommendation

Use explicit file paths, avoid processing sensitive JSON unless necessary, and review any requested output path before allowing writes.