VibeSafe Starter — Minimum Security for Vibe Coders

ReviewAudited by ClawScan on May 10, 2026.

Overview

The included scripts mostly match a security-auditing purpose, but the setup instructions tell users to copy an unreviewed, unpinned GitHub Actions workflow that is not included in the provided artifacts and will run automatically on every push.

Before installing, review and pin the external GitHub repository, especially the missing .github/workflows/security.yml file. The included shell scripts appear aligned with dependency and secret scanning, but run them in a clean project and review any lockfile changes or external API queries.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could install CI automation whose actual contents were not reviewed here, and it would run automatically in their repository after setup.

Why it was flagged

The instructions fetch the install source from an unpinned external GitHub repo and copy a workflow file that is not included in the provided manifest. That workflow is described as persistent automation that runs on every push.

Skill content
### 1. `.github/workflows/security.yml`
Drop this into any repo. Runs on every push.
...
git clone https://github.com/nerua1/vibe-safe-starter.git
cp vibe-safe-starter/.github/workflows/security.yml .github/workflows/
Recommendation

Inspect the GitHub workflow before copying it, pin the repository to a specific trusted commit, and verify the workflow's permissions and commands before enabling it.

What this means

Running the audit may make local dependency-lock changes or trigger package-manager behavior in the target project.

Why it was flagged

The audit script invokes npm install behavior as part of an audit. This is purpose-aligned, but users should know it may contact npm and update package-lock data rather than only reading files.

Skill content
npm install --package-lock-only --silent 2>/dev/null || true

if npm audit --json 2>/dev/null > /tmp/vibe-npm-audit.json; then
Recommendation

Run it in a clean working tree, review any package-lock changes, and consider adding package-manager hardening such as --ignore-scripts if auditing untrusted projects.

What this means

Package names checked with the script are shared with external package/security services.

Why it was flagged

The package-checking script sends package names to public registry and vulnerability APIs, which is expected for this purpose but should be visible to users.

Skill content
curl -s "https://registry.npmjs.org/$PKG/latest"
...
curl -s "https://api.osv.dev/v1/query" -d "{\"package\":{\"name\":\"$PKG\",\"ecosystem\":\"npm\"}}"
...
curl -s "https://pypi.org/pypi/$PKG/json"
Recommendation

Avoid using it for private or sensitive internal package names unless sharing those names with the public APIs is acceptable.