python-dev

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a documentation-only Python tooling setup skill; it suggests local install, formatting, and cleanup commands, but the provided artifacts do not show hidden code, credential use, or data exfiltration.

This skill appears safe to use as a Python project setup guide. Before running its commands, make sure you are inside the intended project, keep changes under version control, review generated `pyproject.toml`, `Justfile`, and `.pre-commit-config.yaml`, and be aware that `just check`/pre-commit may auto-format files. The reviewed artifacts do not justify providing wallets, payment access, or sensitive credentials.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the suggested recipes may change source formatting or remove generated artifacts in the current project.

Why it was flagged

The recommended Justfile runs local CLI tools that can edit project files and delete common build/cache directories. This is disclosed and aligned with Python development, but users should know it mutates the working tree.

Skill content
check:
    uv run ty check
    uv run ruff check --fix && uv run ruff format
...
clean:
    rm -rf dist/ build/ .pytest_cache/ .ruff_cache/ htmlcov/
Recommendation

Run these commands in the intended project directory, preferably under version control, and review diffs after auto-fix or format steps.

What this means

Installing the stack will download and run third-party development tools in the project environment.

Why it was flagged

The setup depends on external packages and GitHub-hosted pre-commit hooks. This is normal for the stated purpose and versions are disclosed, but it is still a supply-chain dependency users should trust.

Skill content
uv add --dev ruff ty pytest pytest-asyncio pre-commit
...
repo: https://github.com/pre-commit/pre-commit-hooks
rev: v6.0.0
...
repo: https://github.com/astral-sh/ruff-pre-commit
rev: v0.15.12
Recommendation

Review dependency sources, keep the lockfile, and use trusted package indexes and pinned hook versions.

What this means

After installation, configured hooks may automatically lint or format files during Git commits.

Why it was flagged

Installing pre-commit creates a project Git hook that continues to run on future commits. This is a normal, user-directed development workflow rather than hidden persistence.

Skill content
Then run: `uv run pre-commit install`
Recommendation

Only install hooks in repositories where you want that behavior, and review `.pre-commit-config.yaml` before enabling it.

What this means

Users may be confused by unrelated high-risk labels and should not provide wallets, payment authority, or secrets for this skill based on the reviewed docs.

Why it was flagged

The high-risk capability signals do not match the reviewed instruction-only Python tooling content or the credential declarations. This looks like a metadata ambiguity rather than evidence that the skill uses wallets, purchases, or credentials.

Skill content
Capability signals: crypto; requires-wallet; can-make-purchases; requires-sensitive-credentials ... Primary credential: none ... Required env vars: none
Recommendation

The publisher should correct the capability signals; users should grant no extra credentials unless a specific, user-chosen project task requires them.