Dynamic code execution
- Finding
- Dynamic code execution detected.
Security checks across static analysis, malware telemetry, and agentic risk
The skill is mostly coherent for generating local HTML slide decks, with some review-worthy implementation and metadata notes but no artifact-backed malicious behavior.
This looks appropriate for creating local HTML slide decks. Before installing, verify the package includes the referenced validator script, avoid running developer eval tooling unless you trust the repository, and do not supply credentials because normal slide generation should not need them.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If you manually run the eval/test scripts, they may execute local project modules; this is normal for developer tooling but should be done only from a trusted checkout.
The static scan shows dynamic module loading in an evaluation script. That executes Python module code if the eval script is run, but the file path and surrounding artifact context indicate local test/eval infrastructure rather than a hidden install-time action.
spec.loader.exec_module(module)
Use the skill for normal slide generation without running developer eval scripts unless you trust the source and understand what those scripts do.
The slide generation flow may fail or skip an intended validation step if the referenced validator is not actually included.
The skill relies on a strict HTML validator before accepting output, but the provided manifest/code-file list does not show scripts/validate_html.py, which creates a package-completeness and reliability gap.
python3 scripts/validate_html.py "$TMP_HTML" --strict
Before relying on the strict validation claim, confirm the installed skill contains the referenced validation script or an equivalent documented validator.