04 Agent Stack Audit

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This audit skill is coherent, but it asks for broad access to local automations, API/subscription information, and project memory, and it includes an exception that could modify scripts without clearly requiring approval.

Install only if you are comfortable giving the agent broad visibility into your automation stack. Before running it, define exact directories, credential inventories, accounts, and memory files that are in scope; require masked secrets in reports; and do not allow any cleanup or script edits without an explicit approval and backup.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A script could be changed in a way that breaks an automation or removes functionality the user still needed.

Why it was flagged

This authorizes modifying user scripts as an exception to the recommend-only workflow, but it does not clearly require explicit user approval before editing code.

Skill content
One exception: If a script references a dead API that has been confirmed cancelled → safe to comment out the call and log it. Don't delete the file.
Recommendation

Require explicit user approval, a visible diff, and a backup before any script is edited, even if the API appears dead or cancelled.

What this means

API keys, account names, billing details, or subscription information could be exposed to the agent or included in reports if not carefully limited.

Why it was flagged

The skill expects access to API key inventory and subscription/billing-related information, but the artifacts do not define which credential stores, accounts, or scopes are in bounds.

Skill content
Cross-reference your API inventory against actual script usage: - Any API key configured but never called in the last 30 days? - Any paid subscription that maps to zero active script usage?
Recommendation

Use read-only inventories where possible, mask secret values, avoid giving raw API keys unless necessary, and explicitly list which accounts and providers may be audited.

What this means

Private project context could be surfaced in audit reports, and stale or poisoned memory could influence cleanup recommendations.

Why it was flagged

The skill directs the agent to read persistent project memory and context files, but it does not bound paths, exclusions, redaction, retention, or how those contents should be trusted.

Skill content
Review project memory and context files: - Any project memory not updated in 30+ days? - Projects marked "on hold" for 60+ days with no activity? - Contradictions between your main context file and individual project files?
Recommendation

Restrict the audit to specific memory directories, redact sensitive content from reports, and treat memory/context files as untrusted evidence that needs user confirmation.

What this means

If a user or agent separately schedules it, the recurring audit could repeatedly inspect local automations and sensitive context.

Why it was flagged

The skill recommends recurring use, but the provided artifacts do not install a scheduler or background process.

Skill content
Scheduled: First Monday of every month, 05:00 local time. Quick scan: Every Sunday (cron health only — 5 min).
Recommendation

Only create recurring runs intentionally, keep them read-only by default, and review reports before allowing cleanup actions.