Skill Audit

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions); human review is required before treating this skill as clean.

This appears reasonable to use for its stated purpose if you run it on repositories you intentionally want audited. Use a least-privilege GitHub token only if needed, review generated reports before sending them to a model or third party, and do not point --target-repo at broad private directories. ClawScan detected prompt-injection indicators (ignore-previous-instructions), so this skill requires review even though the model response was benign.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users may need to understand how the packaged CLI is installed or invoked, and should not assume there is no executable code just because there is no install spec.

Why it was flagged

The metadata presents the skill as instruction-only while the artifact set includes runnable Python package files and documented CLI commands. This is a setup/provenance clarity note, but no automatic install or hidden helper execution is shown.

Skill content
Install specifications: No install spec — this is an instruction-only skill. Code file presence: 28 code file(s)
Recommendation

Treat it as a Python CLI skill, review the package source before use, and prefer a clear pinned install path or local wrapper invocation.

What this means

Using the skill can execute local helper commands such as git, though the provided evidence does not show execution of target-repository code.

Why it was flagged

The skill runs a local git command to collect commit metadata. It uses an argument vector rather than shell=True and is aligned with repository auditing.

Skill content
subprocess.run(["git", "-C", str(target_repo), "rev-parse", "HEAD"], check=True, capture_output=True, text=True)
Recommendation

Run it in a normal least-privilege environment and only point it at repositories you intend to audit.

What this means

A GitHub token, if provided, may be used for GitHub API requests, and repository origin information may be sent to GitHub.

Why it was flagged

The skill may use a GitHub token and contact GitHub for repository reputation checks. This is disclosed and purpose-aligned, with no evidence of credential logging or unrelated use.

Skill content
Optional enhancement: `GITHUB_TOKEN` for higher GitHub API rate limits ... `evaluate` always attempts the GitHub OSINT precheck first when the target repository has a GitHub `origin`
Recommendation

Use a low-scope token only if needed for rate limits, and avoid scanning private repositories unless this GitHub lookup is acceptable.

What this means

Scan outputs or prompt payloads can contain snippets from local repository files, which may include private code or secrets.

Why it was flagged

The scanner recursively reads text files under the user-supplied target repository so it can produce findings and prompt payloads. This is core to the stated purpose, but scanned code or secrets may appear in reports.

Skill content
for dirpath, dirnames, filenames in os.walk(target_repo): ... text = abs_path.read_text(encoding="utf-8")
Recommendation

Review generated JSON/prompt output before sharing it with external systems, and avoid scanning directories broader than the intended repository.