Golang Troubleshooting

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is mostly a normal Go debugging skill, but it deserves review because some troubleshooting steps can expose API keys, database settings, or full production HTTP traffic without enough redaction guidance.

Use this skill for Go debugging only with careful approval of sensitive steps. Do not let it print API keys, database URLs, tokens, cookies, or full production traffic unless values are redacted and you understand where the output will be stored. Consider pinning the Delve version for reproducible installs.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Local or project secrets could be exposed in the conversation, tool output, or logs during debugging.

Why it was flagged

These commands can display database URLs, API keys, or other credentials to the agent/tool transcript. The skill does not pair them with redaction, approval, or a bounded credential contract.

Skill content
# Verify environment variables and config
env | grep DATABASE
env | grep API_KEY
Recommendation

Approve credential-related checks explicitly, verify only whether variables are set, and redact values for API keys, tokens, passwords, and database URLs.

What this means

Sensitive customer data, credentials, or tokens could end up in application logs or observability systems.

Why it was flagged

The production debugging guidance shows logging complete HTTP requests and responses, including bodies, without warning to redact Authorization headers, cookies, tokens, or personal data.

Skill content
dump, _ := httputil.DumpRequestOut(req, true)
log.Printf("request:\n%s", dump)
dump, _ = httputil.DumpResponse(resp, true)
log.Printf("response:\n%s", dump)
Recommendation

Use full request/response dumps only in tightly controlled debugging sessions, redact sensitive headers and bodies, and remove the logging after diagnosis.

What this means

Profile files may contain sensitive runtime, stack, or memory information and may remain on disk after debugging.

Why it was flagged

The skill explicitly handles pprof dumps and warns they contain sensitive runtime information. This is purpose-aligned, but the resulting files can persist and expose stack or memory details.

Skill content
Pprof endpoints MUST be protected with basic auth — NEVER expose them publicly. They leak sensitive runtime information ... curl http://localhost:6060/debug/pprof/heap > heap.prof
Recommendation

Capture profiles only from authorized systems, protect pprof endpoints, store profile files securely, and delete them when no longer needed.

What this means

A later install may use a Delve version different from the one implicitly reviewed today.

Why it was flagged

Delve is an expected Go debugging dependency, but installing @latest is unpinned and may fetch a different version in the future.

Skill content
package: github.com/go-delve/delve/cmd/dlv@latest
Recommendation

Pin Delve to a known version if reproducibility or supply-chain assurance is important.

What this means

More agent contexts may inspect the codebase during broad audits.

Why it was flagged

The skill can delegate broad codebase bug hunts to multiple agents. It is bounded and user-triggered, but the artifact does not define separate data boundaries for sub-agent contexts.

Skill content
Launch up to 5 parallel sub-agents, one per bug category ... Use this mode when the user asks for a broad sweep
Recommendation

Use broad-audit mode only on repositories you are comfortable sharing with the agent environment, and avoid including secrets in code or context.