Encryption

PassAudited by ClawScan on May 1, 2026.

Overview

This is a coherent encryption best-practices skill with no executable install code, but it includes reference commands that can change infrastructure if a user chooses to run them.

This skill appears safe as documentation and best-practice guidance. Before using its infrastructure snippets, confirm the target system, credentials, and rollback plan, especially for Vault, database, Kubernetes, S3, and systemd examples.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied and run without checking the target environment, these commands could disrupt an application or change production credentials.

Why it was flagged

The secret-rotation example shows commands that can change a database password, update Vault, and restart an application deployment. This is purpose-aligned, but materially impactful if run against a real environment.

Skill content
psql -c "ALTER USER appuser WITH PASSWORD '$NEW_PASS';" ... vault kv put secret/myapp/db password="$NEW_PASS" ... kubectl rollout restart deployment/myapp
Recommendation

Treat these snippets as manual runbook examples; require explicit user approval, confirm the environment, and prepare rollback steps before running them.

What this means

A token created with too much access could expose or modify secrets beyond the intended application scope.

Why it was flagged

The Vault example involves creating delegated secret-management credentials. This fits the key-management purpose, but it requires careful privilege scoping.

Skill content
vault token create -policy=myapp-prod -period=24h
Recommendation

Use least-privilege Vault policies, short token lifetimes, and verify the policy contents before creating or distributing tokens.

What this means

A scheduled renewal service can keep modifying certificates and reloading services until it is disabled.

Why it was flagged

The TLS auto-renewal example creates a persistent scheduled service. It is disclosed and appropriate for certificate renewal, but it keeps operating after setup.

Skill content
OnCalendar=*-*-* 02:00:00 ... Persistent=true ... ExecStart=/usr/bin/certbot renew --quiet --deploy-hook "systemctl reload nginx"
Recommendation

Install persistent timers only intentionally, document them, and ensure users know how to inspect, disable, or remove them.