synapse

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

Synapse’s P2P sharing purpose is clear, but it needs review because it can run unpinned remote model code, exposes shell-templated tools, and can merge or export agent memory through a P2P network.

Review this skill carefully before installing. Use it only for files and memory shards you are comfortable sharing over P2P, avoid assimilating unknown shards, do not use the skip-safety option casually, and stop the seeder when finished. For safer deployment, the maintainer should replace shell-templated handlers, pin or avoid remote model code, and add explicit user approval and scoping around memory export/import.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

A malicious or malformed path, tag, query, or output value could make the agent run unintended local commands or operate on unintended files.

Why it was flagged

User-controlled tool parameters are inserted directly into command strings with simple quoting. If the platform executes these handlers through a shell, crafted values containing quotes or shell metacharacters could alter the command.

Skill content
"handler": "python3 {{skillDir}}/logic.py create-shard --source '{{source_db}}' --name '{{display_name}}' --tags '{{tags}}'"
Recommendation

Use argv-style execution instead of shell strings, strictly validate paths and URLs, escape parameters safely, and require user confirmation for share, download, and memory-assimilation actions.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

Running the embedding feature may execute external Python code on the user’s machine, not just load static model weights.

Why it was flagged

The embedding loader trusts remote model code from the model repository, and the provided artifacts do not show a pinned model revision, hash verification, or sandboxing.

Skill content
trust_remote_code=True,  # Required for nomic models
Recommendation

Pin the model to a reviewed revision, avoid trust_remote_code where possible, vendor reviewed model code, or clearly warn users before loading remote model code.

What this means

Private agent memory could be shared, and untrusted downloaded shards could influence future agent behavior after being assimilated.

Why it was flagged

The tool contract allows exporting agent memory and importing downloaded P2P memory into active memory, including an option to skip guardrail checks. The artifacts do not clearly bound which memory can be exported, how imported memory is retained, or when explicit user approval is required.

Skill content
"create_memory_shard" ... "Exports a portion of the agent's vector database" ... "assimilate_shard" ... "integrates a downloaded memory shard into the agent's active memory" ... "skip_safety_check"
Recommendation

Disable autonomous memory export/import by default, require explicit user approval, restrict allowed database paths, record provenance, and remove or strongly gate the skip-safety option.

What this means

A user or agent might trust the assimilation safety scan even though malicious or manipulative content inside the downloaded memory data may not be checked by this code path.

Why it was flagged

The safety comments describe guardrail checks for malicious shard content, but the shown implementation scans shard metadata rather than the actual shard payload, which could make users overestimate the protection.

Skill content
"This runs the data through local 'guardrail' checks" ... "metadata_str = json.dumps(shard.to_dict())" ... "# Scan metadata for threats"
Recommendation

Make the safety limitations explicit, scan the actual shard payload before assimilation, and fail closed when shard content cannot be inspected.

What this means

Search queries, embeddings, metadata, and shared files may become visible to the tracker or P2P peers depending on use.

Why it was flagged

The tracker and peer network are central to the stated purpose, but they create external data flows for embeddings, search, and selected files.

Skill content
"Storage: Tracker stores embeddings (FAISS index), clients store actual files (BitTorrent)"
Recommendation

Only share non-sensitive files or memory shards, review the tracker you use, and understand that P2P sharing may be difficult to fully revoke once peers download content.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Files that the user chose to share may keep being seeded in the background until the daemon is stopped or the file is unshared.

Why it was flagged

A persistent seeder daemon is expected for BitTorrent sharing and stop controls are documented, but it continues operating beyond the initial command.

Skill content
"Start seeder daemon (runs in background)" ... "Stop daemon"
Recommendation

Use list-shared regularly, stop the daemon when finished, and unshare any file that should no longer be available.

What this means

Installation and first run may execute code fetched from the internet and download a large dependency stack.

Why it was flagged

The setup path is user-directed and related to the skill’s Python dependencies, but it relies on a remote install script and automatic dependency installation.

Skill content
curl -LsSf https://astral.sh/uv/install.sh | sh ... Dependencies auto-installed on first run via uv
Recommendation

Install uv from a trusted source, review dependencies before first run, and prefer a lockfile or reproducible installation process.