Deno

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: deno Version: 1.0.0 The OpenClaw AgentSkills bundle for Deno is benign. It consists entirely of documentation (`SKILL.md`, `imports.md`, `node-compat.md`, `permissions.md`) providing educational content, best practices, and warnings about common pitfalls and security risks when working with the Deno runtime. Crucially, sections discussing security vulnerabilities (e.g., 'Permission Traps' in `SKILL.md`, 'Permission Combinations' in `permissions.md`) are framed as warnings and educational material to help users *avoid* insecure configurations, rather than instructions for the AI agent to perform malicious actions or exploit vulnerabilities. There is no evidence of prompt injection, data exfiltration, malicious execution, persistence mechanisms, or obfuscation.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent suggests a Deno command based on this skill, the permission flags determine which files, network hosts, commands, or environment variables the user's code can access.

Why it was flagged

The skill provides examples of running Deno programs with network, file-read, and environment-variable permissions. This is central to Deno guidance and the document explicitly recommends scoping, but these flags can materially affect what a user's program can access.

Skill content
deno run \
  --allow-net=0.0.0.0:8000,api.stripe.com \
  --allow-read=./public,./templates \
  --allow-env=STRIPE_KEY,DATABASE_URL \
  server.ts
Recommendation

Before running generated Deno commands, confirm that permission flags are limited to the specific paths, hosts, commands, and environment variables needed.