Clawshell 0.1.0

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill claims to provide a security-gated shell, but the supplied package does not include the implementation needed to support those claims.

Review carefully before installing. The idea of a human-approved shell wrapper is reasonable, but this package does not include the code that would enforce it. Ask the publisher for the full implementation and verify the dependency list before adding it to TOOLS.md or relying on it for security.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the install step would not install a reviewable ClawShell implementation from these artifacts, so users cannot verify the security behavior being advertised.

Why it was flagged

The only declared npm dependency is an unrelated package, while the skill describes a Node-based shell approval system and the artifact set contains no implementation files. This creates a provenance and functionality gap for the setup step.

Skill content
"dependencies": { "package-lock.json": "^1.0.0" }
Recommendation

Do not rely on this skill until the actual source code, tool definitions, and dependency list are included and reviewed.

What this means

A user may trust the skill as a security control even though the reviewable package does not demonstrate that it can enforce the promised protections.

Why it was flagged

The skill makes strong safety claims about command interception and approval, but the supplied artifacts do not provide the code needed to substantiate those claims.

Skill content
Secure replacement for `bash`. Analyzes command risk and executes only if safe or approved.
Recommendation

Treat the security claims as unverified until the implementation is available, tested, and matches the documented behavior.

What this means

Future agent shell activity could be routed through an unverified or nonfunctional tool, potentially disrupting work or creating a false sense of protection.

Why it was flagged

The instruction would make this skill the default pathway for all shell commands, which is high-impact authority. Because the implementation is absent, the actual limits, approval behavior, and failure modes are unclear.

Skill content
Use `clawshell_bash` for ALL shell command execution. Do not use `bash` directly.
Recommendation

Only configure all shell access through this tool after verifying that the actual implementation exists, blocks dangerous commands, and requires approval as documented.

What this means

Misconfigured or exposed notification tokens could allow unwanted access to the notification integration.

Why it was flagged

The skill requires notification-service credentials for approval prompts. This is purpose-aligned, but users should recognize that these are account tokens.

Skill content
CLAWSHELL_PUSHOVER_USER=your-user-key
CLAWSHELL_PUSHOVER_TOKEN=your-app-token
Recommendation

Use dedicated app tokens with the minimum needed access and avoid committing them to shared files.

What this means

Sensitive command details could remain in local logs and later be visible to the agent or anyone with file access.

Why it was flagged

The skill keeps persistent audit logs and exposes recent log entries through clawshell_logs. Shell commands can contain sensitive paths, tokens, or operational details.

Skill content
All decisions are logged to `logs/clawshell.jsonl`
Recommendation

Review log contents, restrict access to the log directory, and avoid putting secrets directly in shell commands.