Back to skill
Skillv0.0.1
ClawScan security
Venetech News · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 6, 2026, 6:05 PM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's description (Venezuela/LatAm tech news) matches its instructions: it fetches RSS/HTML from listed news sites and summarizes them; it requests no credentials and has no unexpected dependencies.
- Guidance
- This skill appears coherent for news aggregation, but consider the following before installing or running it: - Privacy: it fetches content from many external sites, so the agent's IP and request metadata will be visible to those sites. - Environment impact: the instructions run 'pip install ... --break-system-packages', which can modify the system Python environment; prefer running inside an isolated virtualenv or sandbox or preinstalling libraries. - Legal/ToS: scraping some sites may violate their terms; consider using official RSS/APIs where available. - Reliability & safety: fetched HTML can contain unexpected content; run parsing in a controlled environment and validate outputs. - If you need stricter guarantees, ask the skill author to avoid --break-system-packages, provide a formal install spec, or use vetted news APIs rather than ad-hoc scraping.
Review Dimensions
- Purpose & Capability
- okThe name/description (VeneTech News) align with the runtime instructions: curling RSS/HTML feeds, parsing RSS/XML, and using BeautifulSoup for site-specific HTML. Nothing in the instructions requests unrelated credentials, system access, or tooling beyond what a scraper/summarizer would reasonably need.
- Instruction Scope
- noteThe SKILL.md explicitly instructs the agent to run curl and Python snippets, install Python libraries at runtime (requests, beautifulsoup4), and scrape many external news sites. It does not instruct reading local files or env vars. Considerations: these network requests expose the agent's IP to remote sites and scraping may conflict with sites' terms of service; the instructions include a pip install command and use a custom User-Agent header. No evidence of data exfiltration beyond fetching remote content, but the scope includes repeated external HTTP access.
- Install Mechanism
- noteThere is no formal install spec (instruction-only), so nothing is written to disk by an installer. However, the runtime instructions call 'pip install ... --break-system-packages', which will download packages from PyPI and can modify the Python environment. That is a moderate operational risk in shared or locked-down environments; it is not inherently malicious but is worth attention (prefer preinstalled libs or a virtual environment).
- Credentials
- okThe skill declares no required environment variables, no credentials, and no config paths. The instructions do not reference secrets or unrelated env vars. The external network access required is proportional to the stated purpose (fetching web feeds and pages).
- Persistence & Privilege
- okThe skill is not always-enabled and is user-invocable (defaults). It does not request persistent system privileges or attempt to modify other skills or global agent settings in the SKILL.md. Runtime pip installs would change the local Python environment but that is not the same as requesting permanent platform privileges.
