Back to skill
Skillv0.1.0
ClawScan security
Spring Boot Engineer · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMay 1, 2026, 4:56 AM
- Verdict
- Benign
- Confidence
- high
- Model
- gpt-5.5
- Summary
- This is an instruction-only Spring Boot coding guide, and the reported secret finding appears to be a JWT sample variable rather than a real exposed credential.
- Guidance
- This skill appears safe to use as documentation-driven coding assistance. As with any code-generation aid, review generated Spring Security, CORS, Actuator, JWT, and deployment settings before using them in production, and replace all example placeholders with properly managed configuration or secrets.
- Findings
[suspicious.exposed_secret_literal] expected: The finding is in Spring Security JWT sample documentation. The evidence `String accessToken = [REDACTED](convertToUserDetails(user));` appears to be an access-token generation assignment in example code, not a hardcoded token or exposed secret literal.
Review Dimensions
- Purpose & Capability
- okThe stated Spring Boot engineering purpose matches the included markdown references for web, data, security, cloud, and testing guidance.
- Instruction Scope
- okThe runtime instructions are limited to producing Spring Boot code/templates and architectural guidance; they do not instruct hidden execution, data collection, or unrelated actions.
- Install Mechanism
- okThere is no install spec, no required binaries, no required environment variables, and no runnable code files.
- Credentials
- okThe skill does not request local system, network, credential, or account access; example application placeholders are part of Spring Boot documentation.
- Persistence & Privilege
- okNo persistence, background workers, privilege escalation, credential storage, or autonomous account activity is evidenced in the artifacts.
