Text

PassAudited by ClawScan on May 10, 2026.

Overview

This is a coherent instruction-only text-processing skill, with the main caution that some examples can read or edit local files if an agent runs them.

This skill appears safe for normal text work. Before letting an agent use its command examples, confirm the exact files involved, avoid running in-place edits on originals, and treat .env or config files as sensitive.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A text file could be changed or overwritten if an agent applies the command directly.

Why it was flagged

The skill documents local shell commands, including an in-place file edit. This fits text cleanup, but could alter a user file if run without review.

Skill content
- **Remove BOM if present:** `sed -i '1s/^\xEF\xBB\xBF//'`
Recommendation

Run file-changing commands only on user-approved files, preferably on a copy or with a backup.

What this means

Secrets in a local .env file could be displayed if the command is used on a real project configuration file.

Why it was flagged

.env files commonly contain API keys or secrets. The example is a config-text parsing command and does not show exfiltration, but it could reveal sensitive values to the agent context or output.

Skill content
# .env files
grep -v '^#' .env | grep '='
Recommendation

Ask before reading .env or other credential-bearing files, and redact secret values unless the user explicitly needs them.