Remote Disk Mount

PassAudited by ClawScan on May 1, 2026.

Overview

This is a coherent remote-disk mounting guide, but it uses sudo, installs packages, and handles remote-storage credentials that users should approve and protect carefully.

Before installing or using this skill, confirm you are on Debian/Ubuntu, review every sudo command, use trusted servers, prefer SFTP or HTTPS WebDAV over FTP/plain HTTP, avoid putting passwords directly in chat or shell history, remove credential files when no longer needed, and unmount remote storage after use.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If approved, the agent may install packages and create privileged mounts on the user's machine.

Why it was flagged

The skill documents privileged package installation and mounting commands. This is purpose-aligned for a disk-mount tool and it asks for confirmation, but sudo operations can change the local system.

Skill content
Confirm with user before running sudo commands ... sudo apt install smbclient cifs-utils -y ... sudo mount.cifs //SERVER_IP/share ~/mount_name
Recommendation

Only approve sudo commands after checking the protocol, server, mount path, and package names; avoid running commands for untrusted servers.

What this means

Remote storage passwords or keys could remain on disk or be used to access the remote account if not handled carefully.

Why it was flagged

The skill handles remote-share credentials and stores SMB credentials in a root-owned file. This is expected for SMB mounting and protected with chmod 600, but the credential file may persist until removed.

Skill content
Ask the user for ... Password ... echo "password=$PASSWORD" | sudo tee -a /root/.smbcredentials ... sudo chmod 600 /root/.smbcredentials
Recommendation

Use SSH keys or interactive prompts where possible, avoid sharing passwords in chat, remove credential files after use when appropriate, and use dedicated low-privilege remote accounts.

What this means

Credentials or file contents could be exposed on an untrusted network if plaintext FTP or HTTP WebDAV is used.

Why it was flagged

The examples include FTP and HTTP WebDAV endpoints while also prompting for credentials. These protocols may transmit data or credentials without transport encryption depending on server configuration.

Skill content
curlftpfs -o user=$USERNAME ftp://SERVER_IP/ ~/mount_name ... sudo mount -t davfs http://SERVER_IP/webdav /mnt/webdav
Recommendation

Prefer SFTP, SMB over a trusted network/VPN, or HTTPS WebDAV; avoid FTP or plain HTTP unless the network and server are trusted.

What this means

The skill may appear more portable or dependency-free in registry metadata than it is in practice.

Why it was flagged

The registry metadata does not declare the Linux/sudo dependency, while SKILL.md says the skill is Debian/Ubuntu-only and uses sudo/apt. This is under-declared but not hidden in the skill text.

Skill content
OS restriction: none ... Required binaries (all must exist): none ... No install spec — this is an instruction-only skill.
Recommendation

Install or invoke it only on Debian/Ubuntu-like Linux systems where you are comfortable using sudo and distro package repositories.