PCAP Analyzer

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Invoking the skill may run local code that was not included in the reviewed package; results and side effects depend on whatever script exists at that path.

Why it was flagged

The skill's runnable command executes a developer-specific absolute-path helper outside the packaged files instead of the included scripts/analyze.sh. That helper is not included in the artifacts, so its behavior cannot be reviewed even though it is the primary execution path.

Skill content
command:\n  run: /home/tom/openclaw-tools/pcap_summary.sh {{pcap_path}}
Recommendation

Package and review the helper script, or change the command to use the bundled scripts/analyze.sh. Declare required binaries/files in registry metadata and avoid user-specific absolute paths.

What this means

A malformed or adversarial PCAP path could cause unintended arguments or commands to be processed, depending on the runner's execution semantics.

Why it was flagged

The user-supplied file path is inserted into a command string without visible quoting or argv separation. If the command runner invokes this through a shell, paths containing spaces or shell metacharacters could be split or interpreted unexpectedly.

Skill content
run: /home/tom/openclaw-tools/pcap_summary.sh {{pcap_path}}\ninputs:\n  - name: pcap_path\n    description: Full path to the PCAP file
Recommendation

Pass the PCAP path as a safely separated argument, quote or escape it explicitly, validate that it points to a .pcap/.pcapng file, and prefer the bundled wrapper that quotes "$PCAP".