Coding Agent

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is purpose-aligned for delegating coding work, but it encourages background coding agents with permission bypasses and weak containment assurances.

Install only if you intend to let OpenClaw launch local coding agents. Prefer disposable clones, worktrees, containers, or sandboxed modes; avoid `--yolo` and permission-bypass workflows unless you understand that the delegated agent may make broad changes without confirmation.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A delegated coding agent could change files or run tools without asking the user for normal confirmations.

Why it was flagged

The skill directs the agent to use a mode that bypasses normal permission prompts while retaining full tool access, reducing user review for high-impact coding actions.

Skill content
For Claude Code (`claude` CLI), use `--print --permission-mode bypassPermissions` instead... `--print` mode keeps full tool access and avoids interactive confirmation
Recommendation

Use permission-bypass modes only in disposable clones, containers, or tightly scoped worktrees, and require explicit user approval before broad file changes or command execution.

What this means

If used in a real project or home directory, the coding agent may modify files or execute actions without sandbox containment or approval prompts.

Why it was flagged

The documented Codex workflow includes a no-sandbox, no-approval mode for coding tasks, which is high-impact and weakly bounded.

Skill content
`--yolo` | NO sandbox, NO approvals (fastest, most dangerous)
Recommendation

Avoid `--yolo` for normal use; prefer sandboxed modes, temporary clones, explicit worktrees, and user-reviewed patches.

What this means

Users may believe the agent is confined to one folder when it may still be able to access or affect other local files depending on the CLI mode and environment.

Why it was flagged

The text implies that setting a working directory limits what the agent can see, but a working directory is generally not a security boundary, especially when paired with no-sandbox or permission-bypass modes.

Skill content
`workdir` | Working directory (agent sees only this folder's context)
Recommendation

State clearly that `workdir` is only a starting directory, not containment; recommend containers, sandboxes, or disposable clones for isolation.

What this means

A background coding agent could continue making changes while the user is not actively supervising it.

Why it was flagged

The example combines background execution with a no-sandbox/no-approval agent mode for a broad refactoring task, creating an autonomous process with substantial local authority.

Skill content
bash pty:true workdir:~/project background:true command:"codex --yolo 'Refactor the auth module'"
Recommendation

Use background mode with explicit timeouts, frequent log checks, kill instructions, and only in isolated directories where unintended changes are easy to discard.

What this means

The skill is intended to run local commands and external coding agents, which can affect the local development environment.

Why it was flagged

Shell command execution is central to this skill's purpose and is disclosed, but users should recognize that installing the skill enables the agent to launch local coding CLIs.

Skill content
Use **bash** (with optional background mode) for all coding agent work.
Recommendation

Only use it in repositories where you are comfortable allowing a coding agent to run, and review commands before execution.