Accountability

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill has a legitimate operations-tracking purpose, but it introduces persistent follow-up state and recurring command-based checks without clearly bounded approval, scope, or cleanup controls.

Install only if you want the agent to maintain persistent operations follow-up files and possibly run network-based verification commands. Before use, require approval for executing any stored command, keep credentials out of files, and do not enable any heartbeat cron unless you can inspect and remove the exact scheduled job.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A stale, unsafe, or tampered follow-up command could be executed against local systems or production services.

Why it was flagged

The workflow is driven by shell-style check commands stored in FOLLOWUPS.md and may run them at session start or through automation, but the visible artifact does not clearly require approval or limit command scope.

Skill content
- **Check:** `<exact command to copy-paste>` ... `Check runs (manually, at session start, or via external automation)`
Recommendation

Require explicit user approval before running stored commands, keep checks read-only, and reject commands that mutate infrastructure, deploys, databases, or account state unless separately authorized.

What this means

A background job could continue running checks or modifying follow-up files after the immediate task is complete.

Why it was flagged

A recurring self-monitoring cron indicates persistent background behavior, but the supplied artifacts do not show the exact command, opt-in flow, disable instructions, or scope of what it monitors.

Skill content
- Heartbeat cron configuration (every 2h) with self-monitoring
Recommendation

Only enable any heartbeat cron with explicit user consent, document the exact cron entry, provide a removal command, and keep it scoped to the intended workspace files.

What this means

Anyone or anything that can edit these files may affect future follow-up checks or operational decisions.

Why it was flagged

The skill intentionally persists operational context, commands, origins, deadlines, and histories across sessions; this is purpose-aligned but can influence later agent behavior.

Skill content
`FOLLOWUPS.md` | Active tracking ledger (changes constantly) ... `ARCHIVE.md` | Audit trail of resolved items (append-only)
Recommendation

Keep the files in a trusted workspace, review entries before acting on them, and avoid storing secrets or sensitive internal details beyond what is necessary.

What this means

Verification commands may access production or internal services using the user's environment credentials.

Why it was flagged

The skill may rely on service credentials for verification checks; it appropriately says not to hardcode secrets, but users should still ensure credentials are scoped.

Skill content
If the check requires auth headers or API keys, use env var references (`$CULKIN_API_KEY`), never hardcode secrets.
Recommendation

Use least-privilege tokens for checks, avoid broad admin credentials, and confirm that credential values are not written into FOLLOWUPS.md or ARCHIVE.md.

What this means

A user relying only on the registry summary may not realize the skill expects network-capable command checks.

Why it was flagged

The included manifest declares filesystem/network permissions and curl, while the registry summary reports version 0.1.0 and no required binaries; this is a metadata consistency issue rather than evidence of malicious behavior.

Skill content
"version": "1.0.0" ... "permissions": ["filesystem", "network"] ... "bins": ["curl"]
Recommendation

Align registry metadata with claw.json and clearly disclose curl/network expectations in the published listing.