Back to skill
Skillv1.0.0

ClawScan security

浅草寺.skill · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 14, 2026, 5:37 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill purports to be a simple, local ritual omikuji experience but its included script downloads and executes code and data from a remote GitHub URL at runtime, which is disproportionate and risky.
Guidance
This skill contains a local helper that downloads and executes code and data from a remote GitHub raw URL at runtime. That means the behavior can change after you install it and the remote content could be malicious. Before installing: (1) ask the author to vendor the script and data into the skill package (no runtime downloads), or provide a fixed, signed commit hash/URL rather than raw master/main; (2) inspect the remote repository contents and history yourself; (3) if you must run it, do so in a tightly sandboxed environment or VM with no access to sensitive credentials or networks; (4) prefer skills that are self-contained or whose remote downloads are from a pinned, auditable release. If you are not comfortable with remote code execution, do not install/use this skill.

Review Dimensions

Purpose & Capability
concernThe skill is a lightweight ritual/fortune-telling UI and claims to use a bundled 1-100 fortune set, yet the included runtime helper (scripts/draw_omikuji.py) reaches out to raw.githubusercontent.com to fetch another script and JSON data and then executes that downloaded script. A self-contained omikuji skill should not need to fetch and run remote code; this behavior does not match the stated purpose and suggests unnecessary remote dependency.
Instruction Scope
concernSKILL.md instructs the agent to run python3 scripts/draw_omikuji.py but does not disclose that that script will perform network fetches and execute the downloaded script. The runtime instructions therefore omit a high-impact action (downloading+executing remote code), expanding scope beyond the described local experience.
Install Mechanism
concernThere is no install spec, but the included script programmatically downloads two resources from a raw GitHub URL and then runs the fetched script via runpy.run_path. Downloading and executing remote code at runtime is high risk (content can change on the remote repo) even though the host is GitHub raw; this is effectively a remote code execution bootstrap.
Credentials
noteThe skill declares no required env vars or credentials, which is appropriate. However, it performs outbound network access (HTTP GET to GitHub raw URLs) without declaring this behavior—network access isn't a credential, but it is relevant to proportionality and threat surface.
Persistence & Privilege
okThe skill does not request always: true and does not modify agent-wide configuration. It writes temporary files and executes code in a temp directory but does not request persistent system privileges. Note: the platform default allows autonomous invocation; combined with remote code execution this increases potential impact.