Silviu Core

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: silviu-core Version: 1.0.0 The skill bundle includes instructions for the AI agent to execute shell commands like `curl -I https://github.com`, `export GIT_TERMINAL_PROMPT=0`, and `git ls-remote <repo>` as part of a 'Repo Audit Preflight' runbook in `SKILL.md` and `repo_audit_preflight.md`. While these commands are plausibly needed for the stated purpose, the execution of arbitrary shell commands, especially with a placeholder like `<repo>` that could be substituted by the agent, represents a risky capability and a potential command injection vulnerability if the agent's execution environment does not properly sanitize input. This falls under 'risky capabilities without clear malicious intent'.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may guide you to turn on the browser relay for an active Chrome tab or contact GitHub to verify repository access before cloning.

Why it was flagged

The skill tells the agent/operator to use OpenClaw browser tooling and GitHub network commands. This is tool use, but it is explicit, narrow, and aligned with the stated runbooks.

Skill content
Browser automation requires an attached tab (Chrome relay ON)... `curl -I https://github.com`; `git ls-remote https://github.com/<owner>/<repo>.git | head`
Recommendation

Use the runbooks only for the intended browser tab and repository, and review commands before running them in sensitive environments.