Back to skill
Skillv0.1.10
ClawScan security
OpenExec — Deterministic Execution Boundary for Agent Systems · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignFeb 17, 2026, 10:01 PM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's code, instructions, and requested configuration are coherent with its stated purpose as a deterministic execution boundary; nothing requested or installed is disproportionate or unrelated to that purpose.
- Guidance
- This skill appears to implement what it claims. Consider the following before installing: - Deploy behind a firewall or bind to localhost (the provided run script binds 0.0.0.0 which exposes the service publicly). - Protect any CLAWSHIELD_PUBLIC_KEY and CLAWSHIELD_TENANT_ID values and ensure you only set OPENEXEC_DB_URL to trusted DB endpoints (a remote DB will create outbound network I/O). - Configure OPENEXEC_ALLOWED_ACTIONS to limit registered handlers in production and audit any additional handlers you add to the code. - Run inside a container/VM and avoid running as root since registered handlers run with the process's privileges — the project explicitly states it is an application-layer boundary, not an OS sandbox. - The repo includes test utilities that mint test keys; do not use test keys in production. If you want higher assurance, review any handlers you add and perform an operational hardening checklist (network binding, TLS, logging/rotation, backups).
Review Dimensions
- Purpose & Capability
- okName/description match the code and runtime instructions: the package implements a deterministic execution service, Ed25519 approval verification, replay protection, receipts, and a static action registry. There are no unrelated credentials, binaries, or surprising capabilities in the repo.
- Instruction Scope
- noteSKILL.md and README state 'no outbound HTTP/RPC during execution' and the code respects that (no network calls except optional DB via OPENEXEC_DB_URL). Note: the service exposes inbound HTTP endpoints (intended) and scripts/run.sh binds 0.0.0.0 (public) while docs recommend binding to localhost; operator should pay attention to binding and firewall configuration before deployment.
- Install Mechanism
- okNo installer in the registry metadata but the project is source-distributed with a requirements.txt and simple pip-based install steps. No downloads from untrusted URLs or archive extraction; dependencies are pinned in requirements.txt.
- Credentials
- okNo required secret environment variables; optional env vars (CLAWSHIELD_PUBLIC_KEY, CLAWSHIELD_TENANT_ID, OPENEXEC_ALLOWED_ACTIONS, OPENEXEC_DB_URL) are appropriate for the documented functionality. The code documents that OPENEXEC_DB_URL may enable outbound DB network I/O.
- Persistence & Privilege
- noteSkill writes execution records to a local SQLite DB by default (sqlite:///openexec.db) and stores receipts — expected for this service. always:false and no cross-skill configuration modifications. Operators must still isolate runtime (container/VM) and avoid running as root because handlers execute with host process privileges.
