Golang Security

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a coherent Go security review skill; it can install and run Go security tools, edit project files, and use sub-agents, but no artifact-backed malicious behavior was found.

Before installing, be aware that this skill is designed to inspect and potentially modify Go repositories, run Go/git/govulncheck commands, and use sub-agents for broad audits. These behaviors are appropriate for its purpose, but you should review changes before committing them and consider pinning govulncheck for reproducible installs.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may change project files or run development commands while reviewing or fixing security issues.

Why it was flagged

The skill is allowed to edit files and run broad Go, git, and vulnerability-checking commands; this is expected for a Go security audit/fix skill, but users should notice the repository-level authority.

Skill content
allowed-tools: Read Edit Write Glob Grep Bash(go:*) Bash(golangci-lint:*) Bash(git:*) Agent WebFetch Bash(govulncheck:*) WebSearch AskUserQuestion
Recommendation

Use it in a trusted repository, review generated diffs, and ask the agent to confirm before running commands or making edits if you want stricter control.

What this means

Installing the skill may fetch a newer govulncheck release than the one originally reviewed.

Why it was flagged

The install specification uses the latest version of govulncheck rather than a pinned version; govulncheck is directly relevant to the skill, but @latest can change over time.

Skill content
package: golang.org/x/vuln/cmd/govulncheck@latest
Recommendation

Pin govulncheck to a reviewed version if reproducible installs are important.

What this means

During a full audit, multiple agent workers may inspect parts of the codebase to produce findings.

Why it was flagged

The skill explicitly delegates parts of a codebase audit to multiple sub-agents; this is disclosed and bounded, but it means project context may be shared across agent workers.

Skill content
Audit mode — full codebase security scan. Launch up to 5 parallel sub-agents (via the Agent tool), each covering an independent vulnerability domain
Recommendation

Run full-audit mode only on codebases you are comfortable having the agent inspect, and avoid including unrelated private files in the workspace.