suspicious.prompt_injection_instructions
- Location
- SKILL.md:22
- Finding
- Prompt-injection style instruction pattern detected.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.prompt_injection_instructions
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The documentation includes attack-like wording, but it is used as an example of what the scanner looks for.
The skill discusses prompt-injection text as a threat example. This explains the static prompt-injection signal and appears aligned with the skill’s scanner purpose.
Skills can contain: - 🎭 **Prompt injections** — hidden "ignore previous instructions" attacks
Do not treat the example phrase as an instruction; review scanner results and the skill source normally.
Running the wrapper depends on the current external snyk-agent-scan package, which may update independently of this skill.
The security scanner is executed from an unpinned latest package, so the code run during scans can change over time.
SCANNER_CMD=(uvx snyk-agent-scan@latest)
Prefer a pinned scanner version or verify the scanner package before use, especially in sensitive environments.
The wrapper can change the agent’s installed skills, which is expected but high-impact if used on the wrong slug or with a bad scan result.
After a clean scan, the script installs the staged skill into the user’s persistent OpenClaw skills directory.
mv "$staged_path" "$SKILLS_DIR/"
Use it only with intended skill slugs, review warnings, and avoid --skip-scan unless you accept the risk.
The scanner runs with access to the SNYK_TOKEN environment variable and the staged skill content.
The script expects a Snyk token in the environment so the external scanner can authenticate.
SNYK_TOKEN Required by snyk-agent-scan for authenticated scanning
Use a Snyk token with the minimum necessary permissions and avoid running the wrapper in shells containing unrelated sensitive environment variables.