Quick Test

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A command-running diagnostic skill can read or modify local files if a powerful command is supplied.

Why it was flagged

The skill documentation advertises custom local command execution. This is aligned with an environment-debugging skill, but it is a broad capability if used without user direction.

Skill content
`--command` | Custom command to execute ... `--command "ls -la"`
Recommendation

Use it only for simple, user-approved diagnostic commands and avoid running destructive or sensitive commands through this skill.

What this means

Running the script executes local system commands in the OpenClaw environment.

Why it was flagged

The script invokes commands through the local shell. Shell execution is expected for this diagnostic purpose, but it is still a sensitive capability.

Skill content
subprocess.run(cmd, shell=True, capture_output=True, text=True, timeout=30)
Recommendation

Review commands before running and keep this skill limited to diagnostics.

What this means

Sensitive environment values could appear in the agent conversation or logs if present near the beginning of the environment output.

Why it was flagged

The default test captures environment-variable output and later prints part of command stdout. Environment variables can sometimes contain API keys or other secrets, even though no external transmission is shown.

Skill content
tests.append(run_command(['env', 'head -5'], 'Environment variables'))
Recommendation

Avoid running this in environments with secrets in environment variables, or remove/redact the environment-variable test before use.

What this means

The skill may overstate what it actually verified, such as file-write behavior.

Why it was flagged

The script reports diagnostic test results based mainly on command return codes, and its shell invocation style may not execute arguments exactly as the displayed joined command suggests. This is more of a reliability caveat than a malicious behavior.

Skill content
tests.append(run_command(['echo', 'Quick test passed', '>', '/tmp/quick_test.txt'], 'File write test'))
Recommendation

Treat the output as a rough smoke test, not a comprehensive or security-grade validation of the environment.