Code Review

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill appears to do what it claims: send user-selected code to LogicArt for code review, but users should remember that submitted code leaves their machine.

This skill is reasonable for code review, but treat it like any cloud-based analysis tool: do not submit secrets, credentials, unreleased proprietary code, or customer data unless you trust LogicArt’s handling of that information.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

66/66 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private or proprietary code, including accidentally embedded secrets, may be sent to LogicArt for analysis.

Why it was flagged

The script sends the provided code or selected file contents to an external provider API. This is disclosed and purpose-aligned, but it creates a third-party data-sharing boundary.

Skill content
const API = 'https://logic.art/api/agent/analyze'; ... body: JSON.stringify({ code, language: language || 'unknown' })
Recommendation

Only analyze code you are comfortable sharing with the external service, and remove secrets or sensitive data before submission.

What this means

The skill may not work in environments without Node, and the runtime requirement is less explicit than ideal.

Why it was flagged

The SKILL.md examples invoke `node {baseDir}/scripts/analyze.mjs`, but the metadata does not declare Node as a required binary. This is a minor metadata/provenance gap rather than evidence of unsafe behavior.

Skill content
Required binaries (all must exist): none ... No install spec — this is an instruction-only skill.
Recommendation

Install or verify Node before use, and prefer packages that clearly declare their runtime requirements.