Shadows Security Scanner

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a coherent security-audit checklist skill that uses read-only local and network checks, but it may surface sensitive secrets during the scan.

This skill appears suitable for security review use, but run it only on projects you are authorized to audit. Be careful with outputs because secret-search commands may print real credentials, and dependency audit commands may contact external vulnerability services.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may run local scans and contact vulnerability databases or an explicitly provided URL during an audit.

Why it was flagged

The skill directs use of local command-line tools and network-capable audit commands. This is expected for a security scanner, and the curl check is explicitly limited to a user-provided target URL.

Skill content
npm audit --json ... pip audit ... cargo audit ... curl -sI "$TARGET_URL"
Recommendation

Run it only from the intended project directory, review any target URL before use, and understand that dependency metadata may be sent to audit services.

What this means

Sensitive credentials may appear in the agent conversation, terminal output, or audit report.

Why it was flagged

The skill intentionally searches for hardcoded secrets, including .env files, which can expose real tokens or private keys in command output or reports.

Skill content
grep -rniE "(password|secret|api_key|token|private_key)\s*[:=]..." --include="*.env"
Recommendation

Use this only in trusted workspaces, avoid sharing raw scan output publicly, redact discovered secrets, and rotate any credentials that were exposed.

What this means

If users install these optional tools, they are trusting the package manager source and the current package version.

Why it was flagged

The skill references optional external audit tools installed through package ecosystems. This is purpose-aligned, but the referenced installs are not pinned in the artifact.

Skill content
# Python — requires pip-audit (pip install pip-audit) ... # Rust — requires cargo-audit (cargo install cargo-audit)
Recommendation

Install audit tools from their official documentation or trusted package indexes, and prefer pinned or verified versions in sensitive environments.