Simple File Tree

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill coherently lists a local directory tree and shows no evidence of installation, credentials, network transfer, persistence, or destructive behavior.

This appears safe for its stated purpose. Before installing or using it, remember that it prints directory and filename information into the conversation, so avoid running it on folders whose names or structure are confidential.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on a private folder, the resulting output may reveal sensitive project names, personal filenames, or directory structure to the agent conversation.

Why it was flagged

The skill exposes a local shell-based find command to enumerate a directory tree. This is purpose-aligned and read-only in the provided instructions, but users should choose paths intentionally because filenames and folder names may be sensitive.

Skill content
allowed-tools: Bash(find:*) ... find <DIR_PATH> -maxdepth 3 | sort | sed 's|[^/]*/|  |g'
Recommendation

Use it only on directories whose file and folder names you are comfortable displaying, and specify a reasonable depth for large folders.

What this means

On an unusual system without grep, the helper script could fail even though the declared requirements appear satisfied.

Why it was flagged

The script uses grep, while the declared requirements list find, sort, and sed. This is a minor dependency declaration gap rather than suspicious behavior.

Skill content
if ! echo "$DEPTH" | grep -qE '^[0-9]+$'; then
Recommendation

The publisher should add grep to the required binaries, or avoid using it in the script.