Filesystem Management

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a normal file-management helper, but it can access local files and the reviewed package does not include the executable that would implement the documented commands.

This skill is coherent with its stated purpose, but it is powerful: it can search file contents and copy files. Keep commands scoped to the folders you intend, use dry-run for copy operations, and review any external GitHub/npm code before installing because the runnable executable was not included in the scanned package.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

64/64 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

If invoked with broad paths, the agent could inspect many local file contents or copy files into new locations.

Why it was flagged

The skill exposes content search and batch copy operations. These are expected for filesystem management, but broad paths or copy targets could reveal or modify local files.

Skill content
filesystem search --pattern "TODO" --path ./src --content
filesystem copy --pattern "*.log" --to ./backup/ --dry-run
Recommendation

Use explicit, narrow paths; run copy operations with dry-run first; avoid sensitive directories unless that is the intended task.

#
ASI03: Identity and Privilege Abuse
Low
What this means

The skill may read or write local files within the current user's permissions when asked to perform filesystem tasks.

Why it was flagged

The package declares read-write filesystem authority. That is purpose-aligned for this skill, but it means the tool can operate on files available to the current user.

Skill content
"permissions": {
  "filesystem": "read-write",
  "network": "none",
  "system": "none"
}
Recommendation

Install only if you want the agent to have local file-management capability, and review commands that write, copy, or overwrite files.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

The safety of the actual runnable CLI depends on code that was not included in the reviewed artifact set.

Why it was flagged

The documentation describes installing executable code from an external repository/global npm workflow, while the reviewed artifacts do not include the actual `filesystem` executable referenced by package.json.

Skill content
git clone https://github.com/gtrusler/clawdbot-filesystem.git
cd clawdbot-filesystem
...
npm install -g .
Recommendation

Before running or globally installing the external CLI, review the repository contents and confirm they match the documented permissions and safety behavior.