ComfyUI
Analysis
The skill mostly matches its ComfyUI purpose, but its model-weight downloader can install and run an unpinned GitHub binary and may write files outside the intended model folder for crafted URLs.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
name = unquote(name) if name else "downloaded.safetensors" out_path = os.path.join(model_dir, name)
The script URL-decodes the filename and joins it to the model directory without rejecting decoded path separators or traversal components, so a crafted URL filename could escape the intended models folder.
PGET_RELEASE = "https://github.com/replicate/pget/releases/latest/download" ... f.write(resp.read()) os.chmod(pget_path, 0o755) ... r = subprocess.run(cmd)
If pget is missing, the script downloads the latest external binary at runtime, marks it executable, and later runs it, with no pinned version, checksum, signature verification, or separate user approval in the code.
Run in the background or in a separate terminal so it keeps running. Then retry the workflow run.
The skill may start a local ComfyUI server as a long-running background process; this is disclosed and purpose-aligned, but it persists beyond a single command.
