Workspace Indexer
Analysis
This skill is not malicious, but it would create a recurring, persistent index of workspace directories and memory references, so users should review its scope before enabling it.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"requiredTools": ["exec", "memory_search", "read", "write"]
The skill discloses broad tools, including exec plus file read/write. These are expected for indexing but should be kept read-only except for the intended index output.
定期维护(建议在 HEARTBEAT.md 中配置每天检查一次)
The skill recommends configuring a recurring daily check, which can keep scanning and updating the index after the initial user request.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
首先使用 `memory_search` 搜索每个目录的相关记忆... 写入 `WORKSPACE_INDEX.md` ... 相关记忆
The skill searches memory for each directory and persists memory references in a workspace index, which can expose or over-preserve private context if not bounded or redacted.
