Zipsa

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Zipsa is a coherent privacy-gateway skill, but it asks the agent to send very sensitive data to an unspecified local gateway whose implementation, retention, and provenance are not provided.

Before using Zipsa with real PII, health records, business secrets, or credentials, verify the actual Zipsa server source and version, confirm it is bound to a trusted local endpoint, review its logging and retention settings, and test that cloud-bound prompts are actually redacted.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI04: Agentic Supply Chain Vulnerabilities
Medium
What this means

A user may trust an unverified local service with PII, health records, credentials, or proprietary information.

Why it was flagged

The skill's safety depends on a local privacy gateway that is not provided or tied to a verifiable install source, even though that gateway would receive highly sensitive prompts.

Skill content
Source: unknown; Homepage: none; Install specifications: No install spec — this is an instruction-only skill.
Recommendation

Use only with a verified Zipsa server from a trusted source, document the install path/version, and confirm what component receives prompts before processing sensitive data.

#
ASI06: Memory and Context Poisoning
Medium
What this means

Sensitive information could persist in gateway session state longer than expected or be mixed into later work if session IDs or storage are mishandled.

Why it was flagged

The skill describes retaining a full sensitive conversation thread, but the artifacts do not clearly bound retention, deletion, per-user isolation, or reuse across sessions.

Skill content
Full thread (private zone): everything, including all your personal, business, and operational context.
Recommendation

Require clear retention/deletion controls, unique per-user session IDs, and documented storage boundaries before using this with real sensitive data.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

Any sensitive text passed to the helper will be delivered to whatever service is listening at the configured Zipsa endpoint.

Why it was flagged

The included helper posts the raw user query to a local HTTP relay. This is central to the stated privacy-gateway purpose, but users should know the gateway receives the raw sensitive input.

Skill content
requests.post(f"{base_url}/relay", json={"user_query": query, "session_id": session_id}, timeout=10)
Recommendation

Confirm the endpoint is a trusted local Zipsa instance, keep it bound to localhost unless intentionally deployed otherwise, and avoid using the helper with secrets until configured.

#
ASI03: Identity and Privilege Abuse
Low
What this means

Credentials could be stored or processed by the gateway if users include them in prompts.

Why it was flagged

The skill is explicitly intended to activate when credentials or secrets are present. That is purpose-aligned for a privacy filter, but it means credential material may enter the gateway's local context.

Skill content
Secrets: API keys, credentials, internal system details.
Recommendation

Avoid sending live credentials unless necessary, rotate any credential accidentally included, and verify the gateway blocks or redacts secrets as expected.

#
ASI09: Human-Agent Trust Exploitation
Low
What this means

Users may over-trust the privacy claim and submit highly sensitive data without verifying the actual running gateway.

Why it was flagged

This is a strong privacy guarantee, but the provided artifacts do not include the gateway implementation that would prove redaction, routing, and logging behavior.

Skill content
It ensures that raw private context never leaves the local environment while still allowing the use of powerful frontier models for reasoning.
Recommendation

Treat the privacy guarantee as conditional on the deployed Zipsa service; test redaction behavior and review logs/provider routing before relying on it.