Security Scan

ReviewAudited by ClawScan on May 1, 2026.

Overview

This skill is a coherent, user-directed local security scanner, but its output can include suspected secrets, so users should handle scan results carefully.

This appears safe to use for its stated purpose. Choose the target directory carefully, review results manually, and avoid posting raw scan output if it includes suspected secrets or private file paths.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill will run local shell commands to inspect files in the selected target directory.

Why it was flagged

The skill instructs the user to run a bundled shell script. This is disclosed and central to the security-scan purpose, but it is still local command execution.

Skill content
bash scripts/scan.sh /path/to/target
Recommendation

Run it only from the installed skill directory and only against folders you intend to review.

What this means

If the target contains real credentials, the scan output may reveal them to anyone who can see the output.

Why it was flagged

The scanner searches for API-key-like values and prints matching lines. This is purpose-aligned, but real credentials could appear in the terminal, chat transcript, or copied report.

Skill content
SECRETS=$(grep -rEn 'AIza[0-9A-Za-z_-]{35}|sk-[0-9A-Za-z]{32,}|gsk_[0-9A-Za-z]{16,}|nvapi-[0-9A-Za-z-]{16,}' ...); ... echo "$SECRETS"
Recommendation

Treat findings as sensitive, avoid sharing raw output publicly, and rotate any real credentials that are found.

What this means

The scan may fail or behave differently on systems without these shell utilities.

Why it was flagged

The helper depends on Bash, grep, and find, while the registry requirements list no required binaries. These are common local tools and the behavior is visible, so this is a minor dependency-declaration gap rather than a material concern.

Skill content
#!/bin/bash ... grep -rEn ... find "$TARGET_DIR" -type f -perm -0002
Recommendation

Document Bash, grep, and find as prerequisites if publishing this skill broadly.