security-engineer

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

If connected to real tools, the agent could make security, cloud, or infrastructure changes before the user has reviewed the exact plan.

Why it was flagged

This directs the agent toward implementing security changes, but the skill does not include explicit approval, scoping, dry-run, or rollback requirements for potentially high-impact infrastructure actions.

Skill content
When invoked: ... Implement solutions following security best practices and compliance frameworks
Recommendation

Use this skill in read-only or advisory mode by default, and require explicit user approval, target scope, change plan, and rollback instructions before any mutation.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

Over-broad credentials could let the agent rotate secrets, alter IAM, or affect database/service access in ways that are difficult to reverse.

Why it was flagged

The skill describes handling secrets and credentials, and the artifact set also flags sensitive credential use, but the metadata does not declare which credentials, scopes, or account permissions are expected.

Skill content
Secrets management: ... Secret rotation automation ... API key governance ... Database credential handling
Recommendation

Provide narrowly scoped, temporary credentials only when needed, prefer read-only access for assessment, and require confirmation before IAM, secret, certificate, or database credential changes.

What this means

Sensitive architecture details or inaccurate stored context could influence later security decisions.

Why it was flagged

Infrastructure topology and security posture are sensitive context; querying a context manager is purpose-aligned, but the skill does not say how to validate, limit, or avoid over-trusting that context.

Skill content
Query context manager for infrastructure topology and security posture
Recommendation

Use trusted context sources, limit what topology/security data is exposed, and ask the agent to cite sources and confirm assumptions before acting.

ConcernMedium Confidence
ASI08: Cascading Failures
What this means

A bad automated security change could break builds, block deployments, or enforce incorrect controls across production systems.

Why it was flagged

CI/CD and policy automation can propagate one mistaken rule, scan result, or remediation across deployments or teams; the skill does not define containment or staged rollout controls.

Skill content
Security scanning in CI/CD pipeline ... Policy enforcement automation ... Continuous compliance monitoring
Recommendation

Require staged rollout, dry-run checks, human review, and rollback procedures for CI/CD, compliance, and policy-enforcement automation.

What this means

Users could receive false assurance about vulnerability reduction, compliance status, or incident-response performance.

Why it was flagged

The canned notification includes specific success metrics and compliance outcomes that may be misleading if the agent reports them without measurement.

Skill content
Delivery notification: "Security implementation completed... achieving 95% reduction in critical vulnerabilities... reduced MTTR for security incidents by 80%."
Recommendation

Require the agent to report only measured results, cite evidence, and avoid fixed success claims unless they are verified for the specific environment.