Skill Sandbox

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill has a coherent security-testing purpose, but it asks users to run untrusted code locally while its default mode has no restrictions and its safety claims are stronger than the stated containment.

Review before installing. This appears to be a legitimate sandbox/monitoring tool, but do not assume it safely contains hostile code. Run unknown skills only inside Docker, a VM, or another disposable environment, and avoid the default unrestricted observe mode for anything you do not already trust.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A malicious skill tested in the default mode could still perform actions allowed by the user's local OS permissions, such as reading files, writing files, or making network requests.

Why it was flagged

The skill's central workflow is to execute untrusted skill code, and the documented default mode explicitly does not restrict what that code can do.

Skill content
**observe** (default) — Run the skill and log everything it does. No restrictions.
Recommendation

Do not run untrusted skills in the default observe mode on a real workstation; use a disposable VM/container or an actually restricted sandbox, plus fake credentials and a timeout.

What this means

Users may over-trust the sandbox and run malicious skills on their main machine, believing their files and credentials are fully protected.

Why it was flagged

This broad safety claim is stronger than the documented limitations, including unrestricted default execution and the statement that it is not a true OS-level sandbox.

Skill content
Run any skill safely without risking your agent's data or credentials.
Recommendation

Treat this as a monitoring aid, not a guarantee of safe execution; the skill should make restricted or containerized execution the default and describe its limits more prominently.