Clawd Modifier

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A cosmetic request could modify the trusted Claude Code executable itself; if a pattern match is wrong or the version differs, the CLI may behave unexpectedly or break.

Why it was flagged

The helper can locate a Claude executable in common install paths, perform broad byte-sequence replacement, and write the modified binary back to disk.

Skill content
DEFAULT_PATHS = [Path.home() / ".local/bin/claude", "/usr/local/bin/claude", "/opt/homebrew/bin/claude"] ... data = data.replace(search, replace) ... binary_path.write_bytes(data)
Recommendation

Use only with an explicit user request, run dry-run/list modes first, keep backups enabled, verify the targeted Claude Code path and version, and prefer scoped configuration if available.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Mascot changes can affect future Claude Code sessions, not just the current request.

Why it was flagged

The documentation acknowledges that modifications persist in the installed CLI until an update or restore operation reverses them.

Skill content
Changes are overwritten by `npm update` ... `python scripts/patch_art.py --restore`
Recommendation

Treat changes as persistent local modifications; keep backups, document what was changed, and restore before troubleshooting Claude Code issues.

What this means

Users have less external context for deciding whether to trust the patching scripts.

Why it was flagged

The registry information provides limited provenance for scripts that patch a core developer tool.

Skill content
Source: unknown; Homepage: none
Recommendation

Inspect the scripts locally before use and avoid running them on important Claude Code installations unless you trust the skill source.