dep-audit

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: dep-audit Version: 0.2.1 The skill is designed for dependency auditing and includes strong safety measures like explicit confirmation for fixes and report-only defaults. However, it is classified as 'suspicious' due to two main factors: (1) The `scripts/detect.sh` and `scripts/sbom.sh` files suggest installing `syft` using `curl -sSfL ... | sh`, which is a common but risky practice that executes arbitrary remote code and poses a supply chain vulnerability if the remote script is compromised. (2) The `run_timeout` helper in multiple scripts (e.g., `aggregate.sh`, `audit-cargo.sh`) allows audit tools to run without a time limit if `timeout` or `gtimeout` are unavailable, creating a potential Denial of Service (DoS) vulnerability. While these are not direct malicious actions, they represent significant security risks and vulnerabilities.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may approve a scan believing only lockfiles are read, while the Go path can inspect local project packages/source structure.

Why it was flagged

The Go audit runs govulncheck across all packages under the target directory, which is broader than a lockfile-only dependency read and conflicts with SECURITY.md claims that project source code is never accessed.

Skill content
RAW=$(cd "$DIR" && run_timeout 60 govulncheck -json ./... 2>/dev/null)
Recommendation

Update the documentation to clearly disclose Go source/package analysis, or change the Go workflow to a mode that only uses dependency metadata if that is the intended behavior.

What this means

Running an audit could leave files behind or overwrite same-named files in the working directory without the user explicitly asking for saved output.

Why it was flagged

The normal audit workflow instructs the agent to write fixed output filenames. This can overwrite existing unified.json or report.md files, while the declared write permission is described as on-request for SBOM generation.

Skill content
bash <skill_dir>/scripts/aggregate.sh <npm_result.json> <pip_result.json> ... 1>unified.json 2>report.md
Recommendation

Use temporary files by default, ask before writing reports into the project, and avoid fixed filenames unless the user chooses them.

What this means

If the user confirms, dependency files or local environments may be changed by commands such as npm audit fix or pip install.

Why it was flagged

The skill can suggest and potentially run dependency-fix commands, but the artifact explicitly requires user confirmation before mutation.

Skill content
Ask for explicit confirmation before running ANY fix command. Never batch-run fix commands silently.
Recommendation

Review each proposed fix command, use a branch or backup, and confirm only the changes you want.

What this means

Installing missing tools from remote or latest-version sources can run third-party code on the local machine.

Why it was flagged

The documented SBOM tool install path includes a remote shell installer. It is not shown as automatically executed, but users should recognize the supply-chain implications.

Skill content
curl -sSfL https://raw.githubusercontent.com/anchore/syft/main/install.sh \| sh
Recommendation

Install audit tools from trusted package managers where possible, verify installer sources, and pin versions when appropriate.