Cmd Executor

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill openly provides unrestricted local shell command execution, which is powerful enough to read, modify, or delete data on the gateway without clear limits or approval safeguards.

Treat this as giving the assistant a command prompt on the gateway machine. Use it only in a controlled environment, with least-privilege OS permissions and explicit review before running commands, especially commands that write, delete, download, execute, or access private files.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken, malicious, or agent-generated command could read private files, change system settings, delete data, run programs, or otherwise affect the gateway machine.

Why it was flagged

The skill turns message text directly into a shell command and executes it through child_process.exec; the provided code shows no allowlist, sandbox, confirmation step, or command-impact restriction.

Skill content
const cmd = raw.replace(/^Run command:\s*/i, '').trim(); ... exec(cmd, { maxBuffer: 1024 * 1024 }, (err, stdout, stderr) => {
Recommendation

Install only if you intentionally want full local shell access. Prefer sandboxing, least-privilege gateway accounts, explicit human approval for each command, and a narrow allowlist of permitted commands.

What this means

You have less context for who maintains this high-privilege skill or where to verify its code history.

Why it was flagged

The artifacts provide no upstream source or homepage, which limits provenance review for a skill that can execute arbitrary local shell commands.

Skill content
Source: unknown; Homepage: none
Recommendation

Review the included code yourself and avoid granting it access on sensitive machines unless you trust the publisher and can control its execution environment.