Safe Exec Wrapper

PassAudited by ClawScan on May 1, 2026.

Overview

The skill is a coherent command-output wrapper, but it still runs the underlying command and should be treated as a prompt-boundary aid rather than a sandbox or absolute guarantee.

This appears safe to install if you understand its limits. Use it to label untrusted command output, but continue to review the actual command before running it, especially if the command can modify files, contact services, or use credentials.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A dangerous or privileged command remains dangerous even when wrapped; only the output is labeled as untrusted.

Why it was flagged

The wrapper directly executes the supplied command and arguments. This is central to the skill's purpose, but it means safe-exec is not a sandbox or allowlist.

Skill content
# Execute command - stdout and stderr stream naturally
"$@"
Recommendation

Apply normal user approval and scoping to the underlying command, especially for commands that modify files, access accounts, or use credentials.

What this means

Over-trusting the wrapper could lead a user or agent to run untrusted commands or process hostile output with less caution than warranted.

Why it was flagged

The security framing is strong. The implementation is consistent with the purpose, but users should understand it as a prompt-injection mitigation aid, not a complete guarantee that untrusted output can never influence an agent.

Skill content
This wrapper creates boundaries using random UUIDs that attackers cannot guess, making it impossible to forge closing markers.
Recommendation

Treat safe-exec as defense-in-depth: keep reviewing untrusted output, avoid exposing secrets to untrusted commands, and do not rely on it as a sandbox.

What this means

Using a fixed or attacker-influenced UUID would make the output markers easier to imitate.

Why it was flagged

The script allows a caller-supplied UUID. This can be useful for testing, but if a predictable or externally influenced UUID is used, the boundary-forgery protection is weakened.

Skill content
if [[ "$1" == "--uuid" ]]; then
    UUID="$2"
    shift 2
Recommendation

Use the default random UUID generation for normal operation; reserve --uuid for controlled testing and consider validating the UUID format.

What this means

If added, the agent may keep applying this behavior in future sessions or tasks.

Why it was flagged

The skill suggests a persistent agent-instruction integration. It is disclosed and narrowly scoped to wrapping untrusted command output.

Skill content
Add to SOUL.md or agent instructions:
```markdown
When executing shell commands that may produce untrusted output, 
wrap them with `safe-exec`
Recommendation

Only add the persistent instruction if you want this ongoing behavior, and keep it scoped to untrusted command output.