Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Vibe Sanitizer - Check and Sanitize git repository for secrets

v1.0.0

Use this skill when an agent needs to scan a Git repository for secrets, credentials, or machine-specific file paths, then sanitize safe findings in place or...

1· 15·0 current·0 all-time
byMaco@macoloye
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
CryptoRequires walletRequires OAuth token
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The code, CLI, and SKILL.md align: the package scans a Git repo and can sanitize or export a sanitized copy. However the registry metadata lists no required binaries or credentials even though the CLI and git helper call git subprocesses and the SKILL.md expects the agent to run python3. Declaring 'git' (and documenting that python3 is required) would be expected.
Instruction Scope
SKILL.md instructs the agent to run the bundled Python CLI against a target repo, choose a narrow git scope, scan, and optionally sanitize or export. The instructions explicitly forbid printing raw secrets and constrain export locations; runtime actions described (reading repo files, writing sanitized files, copying files, optional git init in exported copy) match the code and stay within the stated purpose.
Install Mechanism
There is no network download/install behavior — the skill runs bundled Python source from the package. That is lower risk than fetching remote binaries. The skill will execute code on disk (the provided Python files) when run.
Credentials
The skill requests no environment variables, credentials, or external tokens. It only reads repository files and local filesystem paths. No network endpoints or secret-exposing env variables are requested or used by the code.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or system-wide agent settings. It can edit files in the target repository (expected behavior) and can initialize a fresh Git repo in an exported copy if explicitly requested.
What to consider before installing
This package appears to be a local, Git-aware secret scanner whose code matches the documented behavior — it reads repo files, can overwrite tracked files (sanitize --mode in-place), and can create an exported sanitized copy. Before running it: (1) verify the source/trustworthiness (homepage/source is not provided here); (2) review the bundled Python files yourself (they are included) because running them will execute code on your machine; (3) ensure git and python3 are available — the metadata failed to declare 'git' as a required binary even though the tool invokes git commands; (4) back up or work on a clone/scratch copy of any repository you sanitize to avoid accidental data loss; (5) run it in an isolated environment (container or VM) if you cannot fully trust the publisher; and (6) confirm there are no unexpected network calls (a quick grep of the files shows none). These checks would increase confidence that the tool is safe to use.

Like a lobster shell, security has layers — review code before you run it.

latestvk978pv2mkktnkv66r2ms674m9184cpdj

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments