Security Analyst

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions); human review is required before treating this skill as clean.

This skill is reasonable to install for authorized security reviews. Before using it, confirm the codebase is yours to assess, review any proposed shell or package-manager commands, and protect or exclude generated docs/security/runs reports because they may contain vulnerabilities, secret locations, PII flow details, and exploit steps. ClawScan detected prompt-injection indicators (ignore-previous-instructions), so this skill requires review even though the model response was benign.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Generated reports may contain reproducible exploit steps that could be misused if shared broadly.

Why it was flagged

The skill can generate exploit material as part of a security audit. This is dual-use but directly matches the stated penetration-testing and vulnerability-analysis purpose.

Skill content
Exploits: Exploit Development (1 agent, needs all findings) ... Develops complete exploits with PoCs, CVSS scores, CWE/ATT&CK IDs, chains
Recommendation

Use only on systems and code you are authorized to test, and restrict access to generated exploit reports.

What this means

If the agent or user runs optional tooling, it may execute local or package-manager commands in the project environment.

Why it was flagged

The templates reference optional local audit/SBOM commands, including npx-based tooling. These commands are purpose-aligned documentation, not hidden automatic execution.

Skill content
To generate a machine-readable SBOM from this data, use: - CycloneDX: `npx @cyclonedx/cyclonedx-npm` / `cyclonedx-py` / `cyclonedx-gomod`
Recommendation

Review any proposed command before running it, especially commands that download or execute package-manager tools.

What this means

The agent may see secret values or secret locations while auditing the repository.

Why it was flagged

The skill is instructed to inspect files that may contain credentials or secrets. This is expected for a security audit, and the artifacts do not show credential use or transmission.

Skill content
Search for: hardcoded API keys, tokens, passwords, connection strings in source code, config files, and environment files.
Recommendation

Run it only in trusted workspaces, avoid sharing raw outputs publicly, and rotate any real secrets discovered in source or config files.

What this means

Generated files may disclose vulnerabilities, PII flows, secret locations, or exploit details if committed or shared.

Why it was flagged

The skill persists audit outputs to disk, including vulnerability reports, exploit catalogs, and privacy assessments. This is disclosed and purpose-aligned, but the stored context can be sensitive.

Skill content
Full runs write to `docs/security/runs/{YYYY-MM-DD-HHMMSS}/` ... `reports/exploits.md` ... `reports/privacy.md` ... `reports/final.md`
Recommendation

Treat docs/security/runs as sensitive, review before committing to version control, and add it to .gitignore if reports should remain private.

What this means

Sensitive audit details may be propagated across sub-agent context and intermediate files during a run.

Why it was flagged

The workflow shares intermediate security findings between an orchestrator and specialized agents via files. This is part of the design, but it means sensitive findings are available to multiple agent steps.

Skill content
Do NOT send full finding details in your return message. They are on disk. ... `Read` the file at `{FINDINGS_DIR}/{FINDING-ID}.md`
Recommendation

Use the skill in trusted projects and limit the run scope when only a focused assessment is needed.