Runtime Monitor

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill appears to be a coherent local security-monitoring helper, but its reports can include snippets of the text it inspects and its source provenance is limited.

This looks purpose-aligned for local runtime security checks. Before installing, decide whether you trust the publisher, review how reports will be stored or shared, and tune blocking thresholds so the monitor does not accidentally expose sensitive snippets or interrupt legitimate work.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Security reports may contain parts of sensitive prompts, tool outputs, tokens, or credentials that the monitor was asked to inspect.

Why it was flagged

Detection results store and serialize up to 500 characters of the monitored input. If the monitored text contains secrets, reports or downstream logs could expose a snippet.

Skill content
"raw_input": self.raw_input[:500] if self.raw_input else "" ... raw_input=text
Recommendation

Treat monitor reports as sensitive data, avoid sending them to untrusted contexts, and consider redacting or disabling raw input capture if integrating this into a broader agent workflow.

What this means

Legitimate commands or outputs could be blocked or flagged if they match the regex patterns.

Why it was flagged

The monitor is designed to flag or block high-scoring tool-call text. This is aligned with the security purpose, but it can affect whether user-requested actions proceed.

Skill content
def __init__(self, block_threshold: int = 70): ... 风险分超过此值将阻断
Recommendation

Review and tune thresholds and patterns before relying on it as an enforcement control, especially in workflows where false positives could interrupt important tasks.

What this means

Users have less external context for verifying the maintainer, update history, or intended behavior.

Why it was flagged

The package does not provide a source repository or homepage. This is not malicious by itself, but provenance is important for a security-monitoring component.

Skill content
Source: unknown; Homepage: none
Recommendation

Review the included code and publisher trust before installing, and prefer a version with a verifiable source repository if it will gate sensitive agent actions.