PLS Website Audit

PassAudited by ClawScan on May 1, 2026.

Overview

This appears to be a straightforward website audit guide with purpose-aligned commands and no evidence of hidden credential use, persistence, or data exfiltration.

Before installing, be aware that the skill may guide your agent to run website-checking commands and optional third-party audit tools. Use it only on sites you are allowed to test, and verify any npx or pip tools before running them.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the audit may send multiple requests to the target website.

Why it was flagged

The skill documents recursive website crawling for broken-link checking. This is expected for a website audit, but it can generate traffic and should be limited to authorized targets.

Skill content
wget --spider -r -l 2 https://example.com 2>&1 | grep -E "(broken|failed|error)"
Recommendation

Use the skill only on websites you own or are authorized to test, and keep crawl depth/rate appropriate for the site.

What this means

If the user chooses to run those commands, external packages may be downloaded and executed locally.

Why it was flagged

The skill suggests optional external CLI tools installed or run through npx and pip without pinned versions. This is common for audit tooling, but it relies on external package provenance.

Skill content
npx lighthouse https://example.com --only-categories=performance --output=json
...
npx web-vitals https://example.com
...
pip install LinkChecker
Recommendation

Install audit tools from trusted sources, consider pinning versions, and review package provenance before running npx or pip commands.