filesystem-1.0.2
Analysis
This is a disclosed filesystem utility, but the reviewed package points to a missing executable while asking for broad local file access.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"main": "filesystem", "bin": { "filesystem": "./filesystem" }, "files": [ "filesystem", "config.json", "SKILL.md", "README.md", "LICENSE.md" ]The package declares a runnable filesystem executable, but the supplied file manifest lists only config.json, LICENSE.md, package.json, README.md, SKILL.md, and _meta.json. For a tool that claims read/write filesystem capability, the missing executable means the behavior users would run is not present in the reviewed artifacts.
Registry metadata: Slug: filesystem2, Version: 1.0.0 ... _meta.json: "slug": "clawdbot-filesystem", "version": "1.0.2"
The registry and packaged metadata do not fully line up on slug/version, and the source is listed as unknown. This does not prove malicious behavior, but it weakens provenance clarity.
- **Content Search** - Full-text search within files ... `filesystem copy --pattern "*.log" --to ./backup/ --dry-run`
The skill explicitly supports reading file contents and batch copying files. This is purpose-aligned for a filesystem skill, but it is sensitive local authority that should be scoped and reviewed.
