AgentGuard

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may trust the skill as local-only while enabling or receiving reports through external messaging services.

Why it was flagged

The same artifact documents Telegram alert/report channels while promising that no data leaves the machine. For a security monitor that logs file, API, and communication activity, that privacy contradiction is material.

Skill content
alerts: channels: - telegram ... reporting: report_channel: telegram ... Privacy & Security: "No external data transmission" - All processing is local
Recommendation

Clarify the effective default, make external channels explicit opt-in, and document exactly what alert/report data is sent outside the machine.

What this means

Sensitive telemetry such as file paths, API destinations, communication destinations, and alert details could be exposed to other skills or channels without clear limits.

Why it was flagged

The skill advertises collecting communication telemetry and sharing threat data with other skills, but does not define recipient identity, permissions, data minimization, or approval boundaries.

Skill content
Communication Logging: "Log all external communications for audit trails" ... With Other Skills: "Shares threat data with other security skills"
Recommendation

Require explicit opt-in for inter-skill sharing, specify permitted recipients and data fields, and sanitize/minimize shared telemetry.

What this means

Anyone with access to the local ~/.agentguard logs may learn what files and services the agent interacted with.

Why it was flagged

The logger stores persistent local telemetry about file paths and API URLs/domains. It includes sanitization, but still retains sensitive activity metadata.

Skill content
CONFIG_DIR = Path.home() / ".agentguard" ... LOG_DIR = CONFIG_DIR / "logs" ... "path": path ... "url": SensitiveDataSanitizer.sanitize(url)
Recommendation

Limit watched paths, set short retention where possible, protect ~/.agentguard permissions, and enable encryption if the implementation supports it.

What this means

Monitoring and report generation may continue beyond a single user request until stopped or reconfigured.

Why it was flagged

The skill is designed to keep monitoring and generating reports after it is started. This is disclosed and purpose-aligned, but it is persistent behavior.

Skill content
Trigger: Continuous background monitoring ... agentguard start ... reporting: auto_daily_report: true
Recommendation

Start it only when desired, confirm how to stop/status the monitor, and disable auto reports if ongoing reporting is not needed.

What this means

It may be harder to verify the package provenance, dependencies, and exact runtime entrypoints before use.

Why it was flagged

The package includes executable Python scripts and CLI-oriented documentation, but the registry does not provide a source/homepage or install specification.

Skill content
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill ... 5 code file(s)
Recommendation

Verify the publisher/source and review dependencies and entrypoints before running the scripts or installing any missing packages.

What this means

If blocking is enabled, legitimate agent API calls or operations could be interrupted.

Why it was flagged

The default is alert-only, but the skill documents a mode that can prevent operations. That authority is security-relevant even though it is purpose-aligned.

Skill content
block_on_suspicious: false  # true = prevent call, false = alert only ... With Other Skills: Can block operations (if configured)
Recommendation

Keep blocking disabled until tested, use explicit allowlists, and require user confirmation for disruptive enforcement modes.