Security Audit Toolkit

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a coherent instruction-only security auditing checklist; the main caution is that some suggested commands can reveal secrets or change project files.

This skill appears appropriate for security auditing. Before installing or using it, be aware that secret scans can reveal real credentials, automatic fix commands can alter dependencies, external audit tools should be trusted before installation, and the optional pre-commit hook persists until removed.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the secret scans may reveal sensitive credentials from source files or git history.

Why it was flagged

The skill explicitly searches for credentials and secrets, which is expected for a security audit but can expose live tokens or passwords in command output or chat logs.

Skill content
Detecting hardcoded secrets, API keys, or credentials in source code
Recommendation

Run these checks only in trusted workspaces, redact secret values before sharing results, and rotate any real credentials that are found.

What this means

Automatic fixes could change dependency versions or project behavior.

Why it was flagged

The skill recommends automatic dependency remediation commands that can modify project dependency files; this is purpose-aligned but should be user-approved.

Skill content
# Fix automatically where possible
npm audit fix
Recommendation

Review proposed changes, run tests, and inspect diffs before committing dependency fixes.

What this means

External tools may introduce their own supply-chain risk if installed from untrusted or changing sources.

Why it was flagged

The documentation suggests installing or running third-party audit tools from external package registries, including an unpinned Go install at latest.

Skill content
npx audit-ci --high
pip install pip-audit
go install golang.org/x/vuln/cmd/govulncheck@latest
cargo install cargo-audit
Recommendation

Prefer trusted package sources, pin versions where practical, and verify tools before using them in sensitive repositories.

What this means

If installed, the hook can continue blocking commits after the audit task is finished.

Why it was flagged

The skill includes a persistent pre-commit hook example. It is disclosed and purpose-aligned, but it changes repository behavior until removed or bypassed.

Skill content
# .git/hooks/pre-commit - Block commits containing potential secrets
Recommendation

Install the hook only if you want persistent commit checks, inspect it first, and remove it from .git/hooks when no longer needed.