Back to skill
Skillv1.0.0
ClawScan security
complex-bug-debugging-with-ai-en · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 27, 2026, 2:10 AM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's instructions, scope, and requirements are coherent with its stated purpose (a structured human×AI debugging workflow); it is instruction-only, requests no credentials or installs, and does not contain obvious mismatches or unexplained privileges.
- Guidance
- This skill is internally consistent and behaves like a disciplined debugging playbook. Before enabling it: 1) Only use it with agents that have carefully scoped, auditable access to the systems you want debugged (prefer least-privilege, ephemeral credentials). 2) Be prepared for the agent to request access to logs, source artifacts, SSH/K8s, and databases — grant those selectively and monitor audit logs. 3) Do not paste sensitive secrets into free-text prompts; use secure credential injection where possible. 4) Note the skill insists on a specific model capability (Opus 4.7); confirm your agent/model environment meets that requirement or the skill will refuse to proceed. 5) If you need tighter controls, require human approval before the agent executes any commands or fetches artifacts from production.
Review Dimensions
- Purpose & Capability
- okThe name/description (a 7-phase collaborative debugging workflow) matches the SKILL.md instructions. The document explicitly requires powerful runtime capabilities (code read/grep, K8s/SSH access, DB access, log access, network experiments) — those are reasonable and proportionate to a complex-debug workflow. The skill does not ask for unrelated capabilities or credentials.
- Instruction Scope
- noteSKILL.md instructs the agent to perform evidence-driven debugging: request logs, read code, run experiments, and even compare/decompile artifacts in some cases. This is within scope for debugging, but it means the agent will ask to access potentially sensitive system data (logs, configs, binaries, DBs, network endpoints). The instructions also explicitly prevent unsafe behavior (no subjective claims, stop when capabilities are missing).
- Install Mechanism
- okNo install spec and no code files — instruction-only. This is the lowest-risk install profile (nothing is downloaded or written by the skill itself).
- Credentials
- okThe skill declares no required environment variables or credentials. Although the workflow expects access to systems (K8s, SSH, DB, logs), it does not demand unrelated secrets or hidden credentials. Any runtime requests for credentials would be proportional to the debugging task, but they are not pre-declared by the skill.
- Persistence & Privilege
- okalways:false and no install or persistent changes requested. The skill can be invoked normally; it does not request forced inclusion or modification of other skills/configs.
