Back to skill
Skillv1.0.2

ClawScan security

migratesafe · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 14, 2026, 3:19 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, declared requirements, and runtime instructions are coherent with a local DB-migration static analyzer; nothing in the package attempts network exfiltration or requests unrelated credentials, though it will modify repository hook configuration when you install hooks and has a couple of optional environment/tool dependencies to note.
Guidance
This package appears to do exactly what it claims: local regex-based scanning of migration files plus optional git hook installation. Before installing: 1) If you plan to use hooks, be prepared for the tool to create or append to lefthook.yml in your repo root (it runs lefthook install). 2) The Pro/Team features require a MIGRATESAFE_LICENSE_KEY (stored in env or ~/.openclaw/openclaw.json); the license validator can optionally verify JWT signatures if you set CLAWHUB_JWT_SECRET — do not set secrets you don't trust. 3) The tool may call optional binaries (node, openssl) if present; no network calls or exfiltration are present in the shipped scripts. If you want maximal control, inspect scripts/analyzer.sh and scripts/license.sh locally before enabling hooks or setting a license key.

Review Dimensions

Purpose & Capability
okName/description (database migration safety checking) aligns with the shipped scripts, patterns, and CLI commands. Required binaries (git, bash, python3, jq) are used by the scripts. The brew install of lefthook matches the documented behavior for installing pre-commit hooks.
Instruction Scope
noteRuntime instructions and SKILL.md are narrowly scoped to scanning migration files, installing/removing lefthook hooks, and generating reports. The pre-commit hook will source the packaged patterns and analyzer scripts from the skill directory and run a local scan on staged files; it does not perform network calls. Note: the tool reads ~/.openclaw/openclaw.json for configuration/license, which is declared in metadata.
Install Mechanism
okInstall spec only pulls in lefthook via Homebrew (formula: lefthook) which is an expected dependency for git hook integration. There are no downloads from unknown URLs or extract-and-run archive steps in the package.
Credentials
notePrimary credential MIGRATESAFE_LICENSE_KEY is appropriate for the Pro/Team features. The license code optionally looks for CLAWHUB_JWT_SECRET (to verify JWT signatures) and may invoke node/openssl if available; CLAWHUB_JWT_SECRET is not declared in requires.env (it's optional), and node/openssl are optional runtime helpers — this is not required for normal operation but is worth being aware of.
Persistence & Privilege
notealways:false and disable-model-invocation:false (normal). The hooks install command will create or append to a repository-level lefthook.yml and run lefthook install — this modifies repo configuration (expected for a hooks tool). The skill does not request permanent platform-wide privileges or modify other skills' configs.