Dep Vuln Scanner
Analysis
This dependency scanner appears coherent and purpose-aligned, with the main thing to notice being that it sends package names and versions to OSV.dev for vulnerability lookup.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
python3 scripts/dep_vuln_scan.py .
The documented usage depends on a local Python 3 runtime, while the registry requirements list no required binaries. This is an under-declared environment requirement, not evidence of malicious behavior.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
url = "https://api.osv.dev/v1/query" ... payload = {"package": {"name": package_name, "ecosystem": ecosystem}} ... payload["version"] = versionThe scanner sends package names, ecosystems, and versions to OSV.dev. This is expected for the stated vulnerability-checking purpose, but it is still an external data flow.
