Back to skill
Skillv1.0.0

ClawScan security

ACPX Codex Playbook · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 12, 2026, 2:46 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
This is an instruction-only playbook that consistently documents how to run Codex via acpx for file-heavy, multi-step tasks; its requests and instructions match its stated purpose and it does not ask for unrelated credentials or installs.
Guidance
This is a how-to playbook and appears internally consistent. Before using it, understand that following its advice will cause the agent (or you) to run shell commands, create files under /tmp, and potentially install Python packages into a local venv — these actions modify system state and may require network access for pip installs. If you are concerned about safety: run the workflow in an isolated/test environment, avoid placing secrets into prompt files, review generated commands before execution (or run in read-only/exec mode for verification), and validate artifacts in /tmp before moving them to persistent locations. The skill does not request credentials or hidden network endpoints.

Review Dimensions

Purpose & Capability
okName/description (acpx + Codex persistent sessions, file creation, local installs, deliverables) align with the actual content: only runtime guidance for using acpx, using /tmp, using venvs, and preferring shell/Python file writes. There are no unrelated env variables, binaries, or config paths required.
Instruction Scope
noteThe SKILL.md explicitly instructs the agent/operator to set session mode to 'full-access', run shell heredocs, create files under /tmp, and prefer project-local pip installs in virtualenvs. These are coherent with the playbook's purpose but mean the agent (or operator following it) will run shell commands and may install packages — actions that change system state. The instructions do not direct reading or exfiltrating unrelated system secrets or contacting unexpected external endpoints.
Install Mechanism
okNo install spec is present (instruction-only), so nothing is written to disk by the skill itself. The playbook recommends runtime actions (creating a .venv and pip installing) which are normal operational guidance; there is no packaged download URL or extract step in the skill metadata to raise additional install risk.
Credentials
okThe skill requests no environment variables, credentials, or config paths. Recommendations to use /tmp, local .venv, and 'full-access' are proportional to the stated goal of producing local artifacts and resolving filesystem/sandbox issues.
Persistence & Privilege
okThe skill is not always-enabled and is user-invocable (defaults). It does recommend setting an acpx session to 'full-access' during operation; while that expands session-level capabilities, the skill itself does not request persistent platform-level privileges or modify other skills or system-wide agent settings.