Security Essentials

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is an instruction-only marketing-style stub, but it describes broad system hardening, secret scanning, process killing, recurring cron audits, and external reporting without clear safeguards or reviewed implementation.

Review carefully before using. Treat this as an unimplemented or externally linked security toolkit, not a verified hardening tool. Only run read-only checks first, require explicit approval before system changes or process termination, and do not allow secret scans or report delivery until paths, redaction, storage, and destination channels are clearly defined.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent follows these instructions too broadly, it could change critical host settings or disrupt services.

Why it was flagged

SSH, firewall, update, permission, and process changes can affect system availability or lock users out. The artifact does not define safe defaults, approval gates, or rollback steps for these high-impact actions.

Skill content
Host hardening audit — SSH config, firewall status, open ports, system updates, file permissions, running processes. Prioritized findings ... with exact fix commands.
Recommendation

Use read-only audit mode first, review every command manually, keep backups, and require explicit user approval before any SSH, firewall, permission, update, or process change.

What this means

Secrets, token names, or rotation metadata could be exposed to the agent context or stored/reused in ways the user did not expect.

Why it was flagged

The skill describes reading and tracking sensitive credential-related information, but the artifact does not bound scan paths, storage, retention, redaction, or how rotation metadata is protected.

Skill content
Secret hygiene system — scans for exposed secrets, tracks rotation dates, alerts on expiring tokens, checks .gitignore coverage
Recommendation

Define exact scan locations, exclude private or irrelevant paths, redact secret values, and clarify where any rotation records are stored and when they are deleted.

What this means

Sensitive security findings could be sent outside the local machine or to the wrong channel.

Why it was flagged

Security-audit findings may include host, port, process, or secret-related details. The destination channel, authentication, redaction, and approval model are not specified.

Skill content
Automated security cron — daily recurring audit with findings sent to your preferred channel
Recommendation

Require explicit user selection of the destination, redact sensitive values, preview reports before sending, and document how channel credentials and audit data are handled.

What this means

Important applications or services could be terminated unexpectedly, and background monitoring may persist longer than intended.

Why it was flagged

Auto-killing processes and recurring monitoring are autonomous behaviors that can continue beyond a single user request, but the artifact does not define limits, allowlists, opt-in controls, or shutdown procedures.

Skill content
Process & RAM monitoring — identifies memory hogs, auto-kills resource drains, anomaly detection, zombie process cleanup
Recommendation

Make monitoring opt-in, require confirmation before killing processes, maintain allowlists, log all actions, and provide a clear disable/uninstall procedure.

What this means

Users may overtrust the installed skill or assume protections exist when the reviewed artifact does not contain the actual kit.

Why it was flagged

The reviewed package is instruction-only with no implementation files, while the document presents a complete hardening kit and links to an external paid product that was not reviewed in these artifacts.

Skill content
Get Security Essentials ... $9 — Complete security hardening kit with all audits, playbooks, and monitoring.
Recommendation

Do not rely on this artifact as a complete security tool; review the actual implementation, install source, and commands before granting any system access.