Auto Bug Finder

ReviewAudited by ClawScan on May 10, 2026.

Overview

This looks like a real Solidity security scanner, but it overreaches by making itself a mandatory all-code gate, running shell tools from an unexpected parent directory, and being hardcoded to a specific AgentEscrow project while advertised more broadly.

Do not install this as a general always-trusted coding policy. If you use it, run it only in a disposable branch of the exact Solidity project you intend to audit, inspect the script paths first, review every generated patch manually, and make sure Hardhat/Slither dependencies are installed from trusted, pinned sources.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI01: Agent Goal Hijack
What this means

An agent may run this tool or block task completion based on the skill author's claimed policy rather than the user's actual request.

Why it was flagged

The skill tries to impose a mandatory completion gate on all code, not just when the user asks for this scanner.

Skill content
## Auto-Audit Policy (MANDATORY — All Code)
- **All final code** ... must pass Auto Bug Finder before marking complete
- **Gate:** 0 Critical, 0 High, 0 Medium findings required
Recommendation

Treat the policy as optional unless it is your organization's explicit policy; the skill should scope this to user-invoked Solidity audits.

What this means

Users may believe the tool will audit their project generally, while it may target the wrong files, miss most contracts, or fail unexpectedly.

Why it was flagged

The implementation is hardcoded to a specific contract and test file, despite the skill being presented as a general Solidity security scanner.

Skill content
const CONTRACT_PATH = path.join(PROJECT_DIR, 'contracts', 'AgentEscrow.sol');
const TEST_PATH = path.join(PROJECT_DIR, 'test', 'AgentEscrow.test.js');
Recommendation

Make the advertised scope match the code, or require explicit configurable contract/test paths before running.

What this means

The script could compile, test, or run tooling in an unintended directory, potentially executing the wrong local project configuration or plugins.

Why it was flagged

All shell commands run in the parent directory of the script, which may not be the project root described in the usage instructions.

Skill content
const PROJECT_DIR = path.resolve(__dirname, '..');
...
exec(cmd, {
            cwd: PROJECT_DIR,
Recommendation

Run only in a disposable checkout, verify the working directory first, and prefer a version that uses an explicit project path or process.cwd() with validation.

ConcernMedium Confidence
ASI08: Cascading Failures
What this means

An automated fix to smart-contract code could persist and compound across sprints, even if later tests or scans appear clean.

Why it was flagged

The declared workflow repeatedly applies fixes and reruns checks until a gate passes, but the artifacts do not show per-patch user approval, branch isolation, or rollback controls.

Skill content
* 3. FIX - Generate and apply patches
 * 4. VERIFY - Recompile and retest
 * 5. LOOP - Repeat until clean or max sprints
Recommendation

Require human review of each diff, run on a separate branch, keep backups, and do not deploy changes solely because this script reports a clean gate.

What this means

Users may need to install or rely on undeclared npm/pip tooling, which affects reproducibility and provenance.

Why it was flagged

The registry metadata declares no required binaries, while SKILL.md requires Node.js, a Hardhat project, Slither, and likely coverage tooling.

Skill content
Required binaries (all must exist): none
Required binaries (at least one): none
Required env vars: none
Recommendation

Declare required binaries and versions, and install dependencies through a reviewed, pinned setup process.