Evez Skill Vetter

AdvisoryAudited by Static analysis on May 12, 2026.

Overview

Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run against the wrong folder, the tool may inspect many local files, although the provided code does not send them anywhere.

Why it was flagged

The scanner recursively reads files under the user-supplied path. This is expected for local static analysis, but it becomes broader than intended if the user points it at a large or private directory.

Skill content
for filepath in self.skill_path.rglob("*"):
... content = filepath.read_text(encoding="utf-8", errors="ignore")
Recommendation

Run it only on the specific skill directory or a copied review folder, not on broad locations such as a home directory.

What this means

The command may fail unless click is already installed, and users may need to decide how to obtain that dependency.

Why it was flagged

The script depends on the external Python package click, but the provided install metadata has no install spec or dependency declaration.

Skill content
if __name__ == "__main__":
    import click
Recommendation

Install any missing dependency only from a trusted package source, or ask the publisher to declare runtime dependencies explicitly.

What this means

A low score from this tool should not be treated as proof that a third-party skill is safe.

Why it was flagged

The documentation uses strong assurance language for a score produced by a simple static pattern scanner. This is not malicious, but it could cause users to over-trust a low score.

Skill content
0-20: ✅ Safe — install freely
Recommendation

Use the vetter as an initial linting aid and still review permissions, code behavior, provenance, and any external dependencies manually.

Findings (2)

critical

suspicious.dangerous_exec

Location
scripts/vet.py:23
Finding
Shell command execution detected (child_process).
critical

suspicious.dynamic_code_execution

Location
scripts/vet.py:22
Finding
Dynamic code execution detected.