github-bounty-hunter-v2
Analysis
The included code matches the stated GitHub bounty-search purpose and shows no secret access, persistence, file modification, or hidden behavior; users should only verify the package/name before running the npx commands.
Findings (1)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Installation: `npx clawhub install github-bounty-hunter` ... Usage: `npx github-bounty-hunter`
The skill asks users to install/run an npm-style command. Because the registry entry is named github-bounty-hunter-v2 while the documented command and package name are github-bounty-hunter, users should verify they are executing the intended artifact.
