Back to skill
Skillv1.0.0

ClawScan security

00 Action Guard · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 14, 2026, 4:17 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill's stated purpose (always-run action guard that calls a permission-gate) is coherent, but important details are missing and always:true gives it high privilege — this combination is ambiguous and warrants caution.
Guidance
This skill is a policy guard that mandates calling a 'permission-gate' before any non-routine action. That goal is reasonable, but before installing you should: 1) Ask the publisher to explain what 'permission-gate' is (a local skill, an internal API, or an external service) and where calls go; 2) Verify any endpoints, required credentials, and data sent during permission checks — the SKILL.md does not declare them; 3) Consider the risk of always:true: the skill will be active for every agent run and could intercept or block actions — only enable it if you trust the skill's owner and can audit its behavior; 4) If possible, test in a restricted environment first and confirm the agent actually uses a trusted permission-gate implementation rather than an external/untrusted service. If you cannot obtain clear answers about the permission-gate interface and data handling, treat this skill as potentially risky.

Review Dimensions

Purpose & Capability
noteName and description match the instructions: the skill is an action guard that requires permission checks before non-routine operations. It asks for no credentials or installs, which is reasonable for a policy-first, instruction-only guard. However, the SKILL.md refers to calling a 'permission-gate' without specifying what that is (another skill, an API endpoint, or an internal procedure), which leaves an implementation gap.
Instruction Scope
noteInstructions are narrowly scoped to intercepting tool/skill calls and requiring a permission check result before proceeding. They do not reference reading files, env vars, or external endpoints explicitly, which is good. But because the guard mandates calling a separate 'permission-gate' without defining how to call it or what data is passed, the runtime behavior is ambiguous: an agent could call an external service (risking data exposure) or a locally installed policy skill (less risky).
Install Mechanism
okInstruction-only skill with no install spec and no code files — minimal disk/installation risk.
Credentials
noteThe skill declares no required environment variables or credentials, which is appropriate for a policy wrapper. However, because it requires a 'permission-gate' call, any real permission gate might need credentials or endpoints; those are not declared here, creating a mismatch between expected runtime dependencies and declared requirements.
Persistence & Privilege
concernThe skill is published with always:true, meaning it will be force-included in every agent run. That is a significant privilege. While a guard may legitimately want high priority, always:true combined with the missing definition of where permission checks are sent raises the risk that this skill could intercept or influence every operation. The metadata justification in SKILL.md ('highest priority') is semantic but not a technical explanation of why always:true is required.