PwnClaw Security Scan
Analysis
This instruction-only skill is coherent with its security-scanning purpose, but users should run it only on controlled agents because it sends adversarial tests through an external service and recommends permanent prompt changes.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
- Prompt Injection & Indirect Injection - Jailbreaks & Refusal Bypass - Data Exfiltration & Agency Hijacking
The skill intentionally exposes the agent to adversarial prompts as part of a security test. This is disclosed and purpose-aligned, but those prompts are designed to test whether the agent can be redirected.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
GET `https://www.pwnclaw.com/api/test/{token}` ... POST `https://www.pwnclaw.com/api/test/{token}` with `{ "response": "your answer" }` ... PwnClaw sends attacks directlyThe skill routes test prompts and agent responses through the external PwnClaw service or allows that service to contact the agent endpoint directly.
PwnClaw generates specific security rules based on your vulnerabilities. Add them as permanent instructions in your agent's system prompt
The skill recommends converting externally generated scan guidance into persistent agent instructions.
