Clawdbot Filesystem 1.0.2
Analysis
Review before installing: the skill advertises broad filesystem read/write commands, but the actual executable those commands rely on is missing from the provided package.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
7 file(s): LICENSE.md, README.md, SKILL.md, config.json, package-lock.json, package.json, pnpm-lock.yaml
The reviewed files do not include the 'filesystem' executable, while package.json declares it as the CLI bin and the documentation tells users to run or chmod it. The operational code for the read/write filesystem tool is therefore not in the provided artifacts.
"permissions": { "filesystem": "read-write", "network": "none", "system": "none" }The skill explicitly requests read/write filesystem capability. That is aligned with its filesystem-management purpose, but it is high-impact authority if used on broad or sensitive directories.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
- **Content Search** - Full-text search within files - **Context Display** - Show matching lines with context
The skill can retrieve local file contents into the agent's working context. This is purpose-aligned for a search tool, but it may surface sensitive text.
