GI Security Audit

PassAudited by ClawScan on May 1, 2026.

Overview

This is a straightforward instruction-only security audit skill with purpose-aligned scan commands that users should review before running.

This skill appears safe as an instruction-only security checklist. Before use, review any suggested pip, npm, or rg commands, run them in the intended project or an isolated environment, and avoid including actual secret values in shared audit reports.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the suggested commands could install packages from an external package index on the user's machine.

Why it was flagged

The skill suggests installing third-party dependency audit tools without version pins. This is purpose-aligned for vulnerability scanning, but it relies on the package source and changes the local environment.

Skill content
pip install safety
safety check

# 或使用 pip-audit
pip install pip-audit
pip-audit
Recommendation

Run these tools in an isolated virtual environment or approved development environment, and consider pinning or verifying tool versions before installation.

What this means

The agent may inspect local code and dependency metadata to find security issues.

Why it was flagged

The skill documents local command-line scans over project files and dependencies. These commands are central to the stated audit purpose and are not shown with destructive flags, but they should be scoped to the intended repository.

Skill content
npm audit
...
rg -i "password\s*=\s*['\"]|api_key\s*=\s*['\"]|secret\s*=\s*['\"]" --type py
Recommendation

Approve command execution explicitly and run scans only in repositories you intend to audit, avoiding unrelated private directories.