Back to skill
Skillv1.0.0

ClawScan security

Web Application Attack Surface Mapping · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 29, 2026, 11:44 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's requirements and instructions are coherent with its stated purpose (attack-surface mapping for authorized web-app testing); it is instruction-only, requests no extra credentials, and does not try to install or persist anything unexpectedly.
Guidance
This skill appears to be a coherent, instruction-only checklist for authorized web-application reconnaissance. Before using it: (1) ensure you have explicit written authorization for the target (the skill itself emphasizes this); (2) run it only in a controlled project directory or sandbox — source repos and HTTP captures often contain secrets (API keys, DB credentials); (3) do not provide unrelated system credentials or agent tokens to the skill; (4) if you enable the optional network capabilities (WebFetch/Bash), supervise any live requests — the agent can perform broad queries and should not contact third-party endpoints or exfiltrate data without your consent; (5) adopt safe handling and disclosure practices for any sensitive findings (secrets, vulnerabilities). If you need the agent to interact with live targets, require an explicit human-in-the-loop approval step before any network probing.

Review Dimensions

Purpose & Capability
okThe name and description (map content, entry points, fingerprint technologies, enumerate hidden paths) align with the declared execution environment (analyze a codebase, HTTP logs, or intercepted traffic) and required tools (Read/Grep, optional WebFetch/Bash). There are no unrelated env vars, binaries, or install steps requested that would be disproportionate to the stated reconnaissance/mapping purpose.
Instruction Scope
noteSKILL.md is an instruction-only guide to inspect source code, proxies, and public sources and to perform directory-enumeration and fingerprinting. This scope is appropriate, but the workflow inherently involves reading repository files, config artifacts, and HTTP captures — which may contain sensitive credentials. The doc permits network queries (optional WebFetch/Bash) and use of public search/archives; ensure human authorization before any live-target requests. No explicit instructions to exfiltrate results to third-party endpoints were found in the metadata provided.
Install Mechanism
okThere is no install specification and no code files. Because the skill is purely instructions, it does not download or write code to disk — the lowest-risk install profile.
Credentials
okThe skill declares no required environment variables, credentials, or config paths. That is proportionate: mapping an application from provided artifacts or live testing does not require platform secrets. Note: during use, the agent may request access to project files or credentials for external services (e.g., API keys for web archives or bug-bounty platforms) — provide only what is necessary and authorized.
Persistence & Privilege
okalways is false and the skill does not request any increased persistent presence or modifications to other skills or agent-wide settings. Autonomous invocation is allowed by platform default but is not elevated here.