git-weekly

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill is aligned with generating a weekly Git report; the main thing to notice is that it reads recent local Git patch details into the agent context.

This skill appears safe to use for its intended purpose. Before using it, make sure the current working directory is the repository you want summarized, and avoid sharing the generated report if recent commits may contain secrets or proprietary code.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

When invoked, the agent may read recent code diffs from the current repository.

Why it was flagged

This instructs the agent to run a local Git CLI command and ingest patch output. The command is read-only and scoped to recent commits by the configured author, so it is aligned with the skill purpose, but local tool execution should be visible to users.

Skill content
自动执行 `git log --since="7 days ago" --author="$(git config user.name)" --reverse --patch`
Recommendation

Use it only in the repository you intend to summarize, and consider asking for confirmation before running it on sensitive codebases.

What this means

Generated reports may include proprietary implementation details or be influenced by text present in recent commits.

Why it was flagged

The skill uses retrieved code diffs as agent context. This is necessary for the report, but code comments or diffs could contain sensitive details or instructions that should be treated as data rather than authoritative commands.

Skill content
请基于检索到的代码差异(Diff),尝试回答并总结以下内容
Recommendation

Review the report before sharing it, and treat code/diff text as untrusted input for summarization only.

What this means

Users may not realize the skill expects Git to be available and to run in a Git repository.

Why it was flagged

The registry metadata does not declare any required binaries even though the documented workflow depends on running git. This is an under-declared dependency, not evidence of hidden code or unsafe installation.

Skill content
Required binaries (all must exist): none; Required binaries (at least one): none
Recommendation

Document git as a required binary and clarify that the command runs in the current repository.