Dangerous exec
- Finding
- Shell command execution detected (child_process).
Security checks across static analysis, malware telemetry, and agentic risk
NightPatch is not clearly malicious, but it can make unattended local shell and workspace changes, and its cron/setup behavior and raw shell execution need review before use.
Install only after reviewing the scripts. Start with ./start.sh dry-run, do not enable cron until you are comfortable with real changes, back up ~/.bashrc and important workspace files, and check that alias names and patch suggestions are safe before allowing automatic runs.
64/64 vendors flagged this skill as clean.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A malformed or crafted alias suggestion could potentially run commands as the user running NightPatch.
The static scan shows a shell command built with an interpolated alias value. In an automated tool that derives patch suggestions, an insufficiently validated alias could cause unintended shell execution.
const checkAlias = execSync(`alias ${suggested_alias} 2>/dev/null || true`, {Only allow alias names matching a strict safe pattern, avoid shell interpolation where possible, and require user confirmation before any shell-profile change.
If a user enables the generated cron path expecting detection-only behavior, NightPatch may apply real local changes overnight.
The cron setup script writes a nightly runner that uses real run mode. This conflicts with the provided run-nightly.sh and release messaging that emphasize default dry-run behavior, so users may over-trust the safety posture.
cat > "$CRON_SCRIPT" << 'EOF' ... if ./start.sh run >> "$LOG_FILE" 2>&1; then
Make cron setup default to dry-run unless the user explicitly opts into real patching, and align all documentation and generated scripts.
Local reports or audit logs may reveal command patterns, filenames, or workflow details even without external transmission.
The skill clearly discloses reading command history and scanning workspace files, and writing shell configuration. This is purpose-aligned, but command histories and workspace files may contain sensitive information.
技能会访问以下文件: - `~/.bash_history` - **只读**,分析命令使用频率 - `~/.bashrc` - **读写**,仅添加新别名到.bashrc文件(可回滚) - 工作区文件 - **只读扫描**,仅在用户确认后移动
Run dry-run first, review generated reports/logs, and avoid using it on workspaces or shell histories that contain secrets.
Users may not realize this is a runnable Node/shell package with dependencies when relying only on registry metadata.
Registry-level metadata does not describe a source or install spec, while the artifact bundle contains runnable scripts and npm dependency installation steps. The included source and lockfile reduce ambiguity, but users should still verify provenance.
Source: unknown Homepage: none Install specifications No install spec — this is an instruction-only skill.
Confirm the package source, review the included scripts, and install dependencies only from trusted registries.