Hexstrike

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is transparent about being an offensive security helper, but it gives the agent broad command-line testing power and references cloud credentials and untrusted binary execution without enough containment guidance.

Install only if you intend to use this as an authorized security-testing assistant. Review each command before execution, avoid autonomous scans against real systems, run unknown binaries in an isolated VM/container, and use dedicated least-privilege cloud profiles.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could run active scans or attack-style tools that may disrupt systems or create legal risk if aimed at unauthorized targets.

Why it was flagged

The skill intentionally exposes broad direct CLI use of offensive security tooling. This is disclosed and central to the stated purpose, but it can affect real targets if used without careful authorization and command review.

Skill content
Execute security tools directly via `exec`. No middleware, no MCP server — direct CLI access to 150+ security tools with methodology-driven workflows.
Recommendation

Use only on CTFs, lab systems, or explicitly authorized targets; review high-impact commands before execution and apply rate limits.

What this means

If pointed at a powerful cloud profile, the agent may enumerate sensitive cloud resources or operate with broader account authority than intended.

Why it was flagged

The cloud assessment workflow can use local AWS credential profiles, but the artifacts do not define expected IAM scope, account boundaries, output handling, or a dedicated least-privilege profile.

Skill content
prowler aws --profile <PROFILE> --region <REGION> -M json
scout-suite aws --profile <PROFILE>
Recommendation

Use a dedicated read-only assessment role/profile, confirm the target account and region, and avoid using production administrator credentials.

What this means

A malicious or unknown challenge binary could run code on the user's machine, access files, or make network connections.

Why it was flagged

The reverse-engineering workflow tells the agent to execute supplied binaries during dynamic analysis, but the artifacts do not provide sandbox, VM, network-isolation, or credential-isolation guidance.

Skill content
ltrace ./<BINARY>
strace -f ./<BINARY>
gdb ./<BINARY>
Recommendation

Run unknown binaries only in a disposable VM or container with no sensitive credentials and restricted network access.

What this means

Installing security tools from unverified or moving sources can introduce vulnerable or malicious packages.

Why it was flagged

The install guidance is user-directed and purpose-aligned, but it encourages unpinned package installation and broad tool bundles.

Skill content
pip3 install <package>
Go tools: `go install <repo>@latest`
Kali Linux: ... `sudo apt install kali-tools-*`
Recommendation

Prefer trusted repositories, pin versions where possible, and install tools in an isolated security lab environment.