Install
openclaw skills install elixir-security-reviewReviews Elixir code for security vulnerabilities including code injection, atom exhaustion, and secret handling. Use when reviewing code handling user input, external data, or sensitive configuration.
openclaw skills install elixir-security-review| Issue Type | Reference |
|---|---|
| Code.eval_string, binary_to_term | references/code-injection.md |
| String.to_atom dangers | references/atom-exhaustion.md |
| Config, environment variables | references/secrets.md |
| ETS visibility, process dictionary | references/process-exposure.md |
Code.eval_string/1 on user input:erlang.binary_to_term/1 without :safe on untrusted dataString.to_atom/1 on external input| Issue | Flag ONLY IF |
|---|---|
| String.to_atom | Input comes from external source (user, API, file) |
| binary_to_term | Data comes from untrusted source |
| ETS :public | Contains sensitive data |
Complete in order for each finding you intend to report. Do not advance until the pass condition is satisfied.
[FILE:LINE] (or a line range) that you copied from the current file contents; the path resolves in this repo.conn.params, Jason.decode!/1 result, uploaded file path, message from another node) or you drop the finding because the value is compile-time, test-only, or internal per Context-Sensitive Rules.beagle-elixir:review-verification-protocol (skill) are satisfied for this item (no finding if they are not).Use the issue format: [FILE:LINE] ISSUE_TITLE for each finding.
Hard gate 4 requires beagle-elixir:review-verification-protocol (skill); use it as the full pre-report checklist and issue-type verification (it extends beyond this skill’s summary).