Systematic Debugging
Analysis
This is mostly a normal debugging checklist, but it tells the agent to log environment, secrets, and keychain/signing details without clear redaction or approval boundaries.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
BEFORE proposing fixes, add diagnostic instrumentation: For EACH component boundary: - Log what data enters component - Log what data exits component
Adding temporary diagnostic logs is normal for debugging, but the instruction is broad and does not explicitly require minimizing, redacting, or removing instrumentation afterward.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
echo "=== Secrets available in workflow: ===" ... env | grep IDENTITY ... security list-keychains ... security find-identity -v
The skill's diagnostic example tells the agent to inspect or print secret-related environment data and local signing/keychain state, but it does not require redaction, user approval, or limits on where that output may be logged.
