Github Contribution

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent GitHub contribution helper, but it can run Git commands that reset local branches and push to your fork, so users should review the target repository and branch before use.

This skill appears suitable for its stated GitHub contribution workflow. Before using it, make sure the target directory is the correct fork, commit or back up any local work, check the remotes, and understand that the script can reset local main/master and push to your GitHub fork.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the script in a repository with local work on main/master could remove uncommitted changes, and it can push synchronized changes to your fork.

Why it was flagged

The script performs state-changing Git operations, including a hard reset of the local main/master branch and a push to the user's fork. This matches the fork-sync purpose, but it can discard local branch changes or alter the fork's main/master state.

Skill content
git checkout main 2>/dev/null || git checkout master
git fetch upstream
git reset --hard upstream/main 2>/dev/null || git reset --hard upstream/master
...
git push origin main 2>/dev/null || git push origin master
Recommendation

Run it only in the intended fork, check `git status` first, and back up or commit any local work before allowing the sync step.

What this means

The script can use your GitHub authorization to modify your fork if your local Git environment is already authenticated.

Why it was flagged

The script pushes to a GitHub fork and may rely on the user's existing Git credential helper or interactive GitHub authentication. This is expected for a contribution workflow, but the registry metadata does not declare a primary credential.

Skill content
FORK_URL="https://github.com/${USERNAME}/${REPO}.git"
...
git push origin main 2>/dev/null || git push origin master
Recommendation

Confirm the Git remote URLs before running and use a GitHub token or account with only the permissions needed for the fork.

What this means

The package metadata is slightly inconsistent, which may make it harder to confirm exactly which version is being reviewed or installed.

Why it was flagged

The supplied registry metadata and skill.json identify version 1.4.0, while _meta.json says 1.3.0. The skill also has no install spec despite including a shell helper. This is a provenance/packaging inconsistency, not evidence of malicious behavior.

Skill content
"version": "1.3.0"
Recommendation

Prefer installing from a trusted source and verify that the script content matches the version you intend to use.