Back to skill
Skillv0.1.1
ClawScan security
Phenosnap Phenotype Extractor · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignFeb 26, 2026, 3:22 PM
- Verdict
- Benign
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's requirements and instructions are generally consistent with its stated purpose (bootstrapping and running PhenoSnap locally), but it will download and execute third‑party code and relies on heuristic redaction — review the upstream repo and run in an isolated environment before use.
- Guidance
- This skill will download PhenoSnap from GitHub and run its Python code locally and may auto-install Python packages. Before installing/use: (1) supply hp.obo locally and set HPO_OBO_PATH; (2) review the upstream WGLab/PhenoSnap repository code to ensure you trust it; (3) run the skill in a restricted environment or virtualenv (avoid running as admin); (4) verify the redaction step on any sensitive clinical text — heuristics can miss identifiers; (5) be aware the skill will write timestamped input/output files under the chosen baseDir; (6) if you are uncomfortable with automatic pip/get-pip.py network installs or executing third‑party scripts, do not install or audit the repository first. The 'primaryEnv' label for HPO_OBO_PATH is unusual but not itself a secret-exfiltration signal.
Review Dimensions
- Purpose & Capability
- okName/description (phenotype + medication extraction) match the declared needs: python3 to run PhenoSnap, a way to fetch PhenoSnap (git/curl/PowerShell), and an HPO OBO file (HPO_OBO_PATH) for ontology lookup. These requirements are proportionate to the stated purpose.
- Instruction Scope
- noteSKILL.md stays on task (redact user PHI, write inputs/outputs locally, run PhenoSnap). It explicitly clones or downloads PhenoSnap and may auto-install Python dependencies and run PhenoSnap scripts — i.e., it instructs the agent to fetch and execute third‑party code. Redaction is required but implemented as heuristics (may miss identifiers). The skill writes timestamped files to disk under baseDir.
- Install Mechanism
- noteNo formal install spec; runtime instructions fetch code from GitHub (https://github.com/WGLab/PhenoSnap) via git or downloadable zip — a common and traceable source. There is fallback to pip/get-pip.py and running pip installs, which increases attack surface. URLs used are GitHub releases/branches (not shorteners or unknown personal servers), so risk is moderate but expected for this type of skill.
- Credentials
- noteThe only required env var is HPO_OBO_PATH (a path to an ontology file), which is appropriate. It is odd that this path is declared as the 'primary credential' (primaryEnv) even though it isn't a secret; this is a labeling quirk but not materially harmful. No API keys or unrelated secrets are requested.
- Persistence & Privilege
- okalways:false (not force-included). The skill writes artifacts under a declared baseDir and creates local directories; it does not request system-wide config changes or other skills' credentials. Autonomous invocation is enabled (platform default) but not a special privilege here.
