ResearchVault

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill's code, runtime instructions, and requested environment variables are coherent with a local-first research orchestration tool; nothing in the bundle requests unrelated credentials or a hidden installer, though it runs a local portal that executes the CLI and writes local state.

This repository and its SKILL.md are internally coherent with a local-first research vault. Before installing: 1) Review start_portal.sh and run_portal.py to confirm they only bind to localhost and that the portal token handling meets your requirements. 2) Protect the generated .portal_auth (token) file (chmod 600) and do not expose the portal to untrusted networks; the portal can run vault CLI commands when authenticated. 3) Set provider API keys (BRAVE_API_KEY, SERPER_API_KEY, SEARXNG_BASE_URL) only in the backend process environment as documented—the portal intentionally disallows secret writes. 4) Run inside a virtualenv and inspect scripts/services/ if you plan to run MCP/watchdog: they must be started manually. 5) If you need higher assurance, review vault_exec.run_vault and scuttle implementation to validate subprocess environment handling and SSRF protections. Installing and running this skill is reasonable if you accept local state persistence and protect the portal token.

Static analysis

Static analysis findings are pending for this release.

VirusTotal

66/66 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.