File Hasher

PassAudited by ClawScan on May 1, 2026.

Overview

File Hasher appears to be a straightforward local file-hashing utility with no evidence of network access, credential use, persistence, or destructive behavior.

This skill looks safe for normal file-integrity checks. Before installing, note that it can read any files or directories the agent is allowed to access, so only ask it to hash paths you intentionally want processed.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent is asked to hash a broad directory, it may read many accessible local files and print their names and hashes.

Why it was flagged

The script can recursively walk a user-selected directory and read files to compute hashes. This is expected for a file-hashing tool, but broad paths could include many private files.

Skill content
if recursive:
        for root, dirs, files in os.walk(directory):
Recommendation

Use explicit file or directory paths and avoid recursive hashing of home, system, or sensitive directories unless that is intended.

What this means

Users have less external context for who maintains the skill or where to verify its source.

Why it was flagged

The package does not provide an upstream source or homepage. The included artifacts are simple and dependency-free, but provenance is limited.

Skill content
Source: unknown
Homepage: none
Recommendation

Review the included script before use and prefer installing from a trusted registry or publisher when provenance matters.