Back to skill
Skillv1.0.2
ClawScan security
migratesafe · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 14, 2026, 3:19 PM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's code, declared requirements, and runtime instructions are coherent with a local DB-migration static analyzer; nothing in the package attempts network exfiltration or requests unrelated credentials, though it will modify repository hook configuration when you install hooks and has a couple of optional environment/tool dependencies to note.
- Guidance
- This package appears to do exactly what it claims: local regex-based scanning of migration files plus optional git hook installation. Before installing: 1) If you plan to use hooks, be prepared for the tool to create or append to lefthook.yml in your repo root (it runs lefthook install). 2) The Pro/Team features require a MIGRATESAFE_LICENSE_KEY (stored in env or ~/.openclaw/openclaw.json); the license validator can optionally verify JWT signatures if you set CLAWHUB_JWT_SECRET — do not set secrets you don't trust. 3) The tool may call optional binaries (node, openssl) if present; no network calls or exfiltration are present in the shipped scripts. If you want maximal control, inspect scripts/analyzer.sh and scripts/license.sh locally before enabling hooks or setting a license key.
Review Dimensions
- Purpose & Capability
- okName/description (database migration safety checking) aligns with the shipped scripts, patterns, and CLI commands. Required binaries (git, bash, python3, jq) are used by the scripts. The brew install of lefthook matches the documented behavior for installing pre-commit hooks.
- Instruction Scope
- noteRuntime instructions and SKILL.md are narrowly scoped to scanning migration files, installing/removing lefthook hooks, and generating reports. The pre-commit hook will source the packaged patterns and analyzer scripts from the skill directory and run a local scan on staged files; it does not perform network calls. Note: the tool reads ~/.openclaw/openclaw.json for configuration/license, which is declared in metadata.
- Install Mechanism
- okInstall spec only pulls in lefthook via Homebrew (formula: lefthook) which is an expected dependency for git hook integration. There are no downloads from unknown URLs or extract-and-run archive steps in the package.
- Credentials
- notePrimary credential MIGRATESAFE_LICENSE_KEY is appropriate for the Pro/Team features. The license code optionally looks for CLAWHUB_JWT_SECRET (to verify JWT signatures) and may invoke node/openssl if available; CLAWHUB_JWT_SECRET is not declared in requires.env (it's optional), and node/openssl are optional runtime helpers — this is not required for normal operation but is worth being aware of.
- Persistence & Privilege
- notealways:false and disable-model-invocation:false (normal). The hooks install command will create or append to a repository-level lefthook.yml and run lefthook install — this modifies repo configuration (expected for a hooks tool). The skill does not request permanent platform-wide privileges or modify other skills' configs.
