Perry Coding Agents

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill matches its remote coding-agent purpose, but it directs long-running background agents over SSH with host-key checks disabled and only loosely bounded control.

Review this before installing if you do not fully trust the Perry workspaces and remote coding agents. Confirm the target IPs, avoid disabling SSH host verification where possible, use scoped credentials and short-lived hook tokens, and make sure you have a way to monitor, cancel, and review any background coding-agent work before changes are merged.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

A remote coding agent may keep running and modifying the project until it decides it is done, making it harder to stop, audit, or bound the work.

Why it was flagged

The skill explicitly instructs launching remote coding agents in the background without a hard runtime limit, which can continue changing a workspace after the initial dispatch.

Skill content
- **No hard timeouts** — background dispatch, let agent run
Recommendation

Add explicit user confirmation, timeout or cancellation guidance, task IDs, allowed repositories/branches, and a clear stop procedure for background agents.

What this means

If the IP is wrong or intercepted, coding prompts, repository access, or callback tokens could be sent to an unintended host, and the command can start high-impact remote automation.

Why it was flagged

The documented dispatch command disables SSH host-key verification while running a raw remote shell command that starts a coding agent.

Skill content
ssh -o StrictHostKeyChecking=no workspace@<IP> "cd ~/<project> && /home/workspace/.opencode/bin/opencode run 'task'" &
Recommendation

Avoid disabling host-key verification by default; use pinned host keys or known_hosts, verify Tailscale identities, and require review before launching remote coding commands.

What this means

The remote agent may make repository changes or PR updates using the credentials available in the workspace.

Why it was flagged

The skill expects the remote coding agent to use workspace and likely Git/GitHub credentials to create PRs, push fixes, and inspect CI, which is aligned with the coding purpose but uses delegated account authority.

Skill content
Create PR when done... CI failing: test/auth.test.ts line 42. Fix and push.
Recommendation

Use least-privilege workspace and Git credentials, restrict allowed repositories and branches, and require human review before merging or applying sensitive changes.

What this means

Old or incorrect context could influence later coding tasks, and project details may persist in the remote agent's local state.

Why it was flagged

The skill relies on persistent OpenCode context stored in the workspace home directory, which may carry prior task context into later work.

Skill content
- **Reuse sessions** — OpenCode keeps context in `~/.opencode/`
Recommendation

Clear or separate agent sessions between unrelated tasks, avoid reusing context across repositories or trust boundaries, and document retention expectations.

What this means

The wake token and callback address may be visible to the remote agent, its logs, or the workspace process environment if handled carelessly.

Why it was flagged

The dispatch prompt gives the remote coding agent a callback address and bearer token so it can notify the original environment when finished.

Skill content
When done: curl -X POST http://${WAKE_IP}:18789/hooks/wake -H "Authorization: Bearer <hooks-token>"
Recommendation

Use short-lived, least-privilege wake tokens, avoid logging them, rotate them regularly, and ensure the callback only accepts the intended minimal action.