Remote Disk Mount
PassAudited by ClawScan on May 1, 2026.
Overview
This is a coherent remote-disk mounting guide, but it uses sudo, installs packages, and handles remote-storage credentials that users should approve and protect carefully.
Before installing or using this skill, confirm you are on Debian/Ubuntu, review every sudo command, use trusted servers, prefer SFTP or HTTPS WebDAV over FTP/plain HTTP, avoid putting passwords directly in chat or shell history, remove credential files when no longer needed, and unmount remote storage after use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If approved, the agent may install packages and create privileged mounts on the user's machine.
The skill documents privileged package installation and mounting commands. This is purpose-aligned for a disk-mount tool and it asks for confirmation, but sudo operations can change the local system.
Confirm with user before running sudo commands ... sudo apt install smbclient cifs-utils -y ... sudo mount.cifs //SERVER_IP/share ~/mount_name
Only approve sudo commands after checking the protocol, server, mount path, and package names; avoid running commands for untrusted servers.
Remote storage passwords or keys could remain on disk or be used to access the remote account if not handled carefully.
The skill handles remote-share credentials and stores SMB credentials in a root-owned file. This is expected for SMB mounting and protected with chmod 600, but the credential file may persist until removed.
Ask the user for ... Password ... echo "password=$PASSWORD" | sudo tee -a /root/.smbcredentials ... sudo chmod 600 /root/.smbcredentials
Use SSH keys or interactive prompts where possible, avoid sharing passwords in chat, remove credential files after use when appropriate, and use dedicated low-privilege remote accounts.
Credentials or file contents could be exposed on an untrusted network if plaintext FTP or HTTP WebDAV is used.
The examples include FTP and HTTP WebDAV endpoints while also prompting for credentials. These protocols may transmit data or credentials without transport encryption depending on server configuration.
curlftpfs -o user=$USERNAME ftp://SERVER_IP/ ~/mount_name ... sudo mount -t davfs http://SERVER_IP/webdav /mnt/webdav
Prefer SFTP, SMB over a trusted network/VPN, or HTTPS WebDAV; avoid FTP or plain HTTP unless the network and server are trusted.
The skill may appear more portable or dependency-free in registry metadata than it is in practice.
The registry metadata does not declare the Linux/sudo dependency, while SKILL.md says the skill is Debian/Ubuntu-only and uses sudo/apt. This is under-declared but not hidden in the skill text.
OS restriction: none ... Required binaries (all must exist): none ... No install spec — this is an instruction-only skill.
Install or invoke it only on Debian/Ubuntu-like Linux systems where you are comfortable using sudo and distro package repositories.
