Back to skill
Skillv0.1.0

ClawScan security

Skill Evolver · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 10, 2026, 3:46 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, instructions, and tooling are coherent with its stated purpose (skill discovery, inspection, audit, orchestration, and optional fusion); nothing requested is disproportionate, though the audit flow includes detection of destructive patterns and an explicit removal suggestion that you should review before allowing automated execution.
Guidance
This skill appears internally consistent and implements a reasonable workflow for discovering, inspecting, auditing, and fusing skills. Before installing or allowing autonomous runs, consider: 1) Review the three bundled scripts (audit_skill.py, verify_skill.py, search_skills.py) to ensure they meet your expectations; they read your local skill directories (e.g., ~/.claude/skills) and generate reports. 2) Do not allow automated execution to run the shell removal snippet or any destructive command without an explicit human confirmation — the audit report includes an rm -rf suggestion that could be executed if you or an agent runs it. 3) If you enable registry interactions, be aware the docs recommend running global installs (npm i -g clawhub) or npx commands; prefer running those manually under a controlled environment. 4) If you plan to use fusion/materialization, review the 'skill-creator' tool or process that will produce new code and audit it before installing. If you want higher assurance, run the scripts in a sandbox or non-production environment first.
Findings
[HIGH_RISK_PATTERN_rm_-rf] expected: The audit script intentionally searches for destructive command patterns like 'rm -rf'. Finding these literals in the audit script is expected because the script flags them in candidate skills.
[HIGH_RISK_PATTERN_curl_pipe_bash] expected: The audit script includes patterns to detect remote code execution patterns (e.g., 'curl ... | bash'). Presence of this detection pattern is expected for a security auditor.
[HIGH_RISK_PATTERN_cat_private_keys] expected: The auditor scans for credential-access patterns (e.g., reading .pem/.key/id_rsa). This is expected for the script's purpose.

Review Dimensions

Purpose & Capability
okName and description match the included files and runtime instructions: the repo contains search, verify, and audit scripts and many templates describing search/inspection/fusion/orchestration; these are exactly what a 'skill lifecycle manager' would need.
Instruction Scope
noteSKILL.md instructs the agent to create an output directory, run intent analysis, search local and remote registries, verify installation, run security audits, and optionally invoke a skill-creator. The scripts read local skill directories (e.g., ~/.claude/skills and ./skills), inspect SKILL.md content, and produce audit reports. This is within scope, but the audit workflow produces explicit removal instructions (a rm -rf command snippet) when a high-risk pattern is found — allowlist/confirm any destructive actions before permitting autonomous execution.
Install Mechanism
okNo install spec; this is an instruction-only skill with bundled utility scripts. No remote downloads or extract/install steps are present in the repository files. External CLIs (npx skills, clawhub) are optional prerequisites referenced in docs; those are standard for registry interactions.
Credentials
okThe skill declares no required environment variables or credentials. The scripts operate on local skill directories and templates; they do not request secrets or unrelated credentials. References to external CLIs are optional and reasonable for registry searches.
Persistence & Privilege
okalways is false and the skill does not claim permanent elevated privileges or attempt to modify other skills' configs. The workflow can invoke destructive actions (deleting a skill directory) but the repo only suggests rm -rf in an audit report rather than performing deletion itself — still, human confirmation is advisable before executing such actions.