Dynamic code execution
- Finding
- Dynamic code execution detected.
Security checks across static analysis, malware telemetry, and agentic risk
This appears to be a purpose-aligned security scanner, but its reports and optional VirusTotal use may expose code snippets, detected secrets, or file information if shared carelessly.
This skill is reasonable for scanning a specific skill directory, but treat its output as sensitive because it may include discovered secrets. Use a narrow skill_path, be cautious with HTML reports, and enable VirusTotal only when you are comfortable sharing the relevant file hashes or files with that provider.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If pointed at a large or private directory, the tool may inspect and summarize files beyond the intended skill.
The scanner recursively reads files under the supplied path. This is necessary for scanning, but a broad path could include unintended local files.
py_files = list(self.skill_path.rglob("*.py")) ... text_files = [f for f in self.skill_path.rglob("*") if f.is_file() ...]Run it only on the specific skill directory you intend to review, not on a home directory, system root, or unrelated private workspace.
Using this option gives the skill access to a VirusTotal API key and may consume that account's quota.
The skill accepts an optional VirusTotal credential, which is expected for its advertised provider integration.
"name": "virustotal_api_key", "description": "Optional VirusTotal API key for file reputation scanning"
Use a dedicated VirusTotal key if needed, avoid sharing command logs containing the key, and rotate the key if it is exposed.
Generated JSON/HTML reports may contain sensitive code fragments or credentials from the scanned skill.
Detected secret lines are included as snippets in scan results, so real credentials found in scanned files may appear in reports or agent-visible output.
message="Potential hardcoded secret detected", snippet=line.strip()[:80]
Treat scan reports as sensitive, redact secrets before sharing, and avoid committing generated reports to public repositories.
When enabled, file hashes or file data may be sent to an external provider, which can be sensitive for private or proprietary skills.
The documentation discloses optional use of an external VirusTotal service for file reputation checks.
VirusTotal(可选) - 扫描技能包中的二进制文件和脚本 - 检查文件哈希信誉 - 需要 VT API key
Enable VirusTotal only for files you are comfortable checking with that service, and review the full implementation before using it on confidential code.