createrepo

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill is coherent with RPM repository management, but its examples can change package repositories, signing state, and package-manager trust settings if run.

This looks like a benign instruction-only RPM repository management skill. Before using it, make sure you understand each shell command, run it only against intended repository paths, protect signing keys, and avoid disabling package signature checks except for temporary local testing.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running these commands on the wrong path or repository ID could overwrite metadata or mirror unwanted packages.

Why it was flagged

The skill gives shell commands that modify repository metadata and sync remote repository content. This is expected for RPM repository management, but the commands should be applied only to intended repositories.

Skill content
createrepo --update /path/to/repo ... reposync --repoid=fedora --download_path=/path/to/mirror
Recommendation

Confirm paths, repository IDs, and target directories before running any command, especially sync or update operations.

What this means

If the wrong key or package set is used, clients may trust packages that were not intended to be trusted.

Why it was flagged

The signing examples rely on local RPM/GPG trust and signing authority. That is central to repository signing, but it can affect which packages systems trust.

Skill content
rpm --import /path/to/RPM-GPG-KEY-myrepo ... for rpm in /path/to/repo/Packages/*.rpm; do rpm --addsign "$rpm"; done
Recommendation

Use dedicated signing keys, protect private keys, and verify the package list before bulk-signing RPMs.

What this means

Unsigned or unverified packages from the local repository could be installed later if the configuration is used as-is.

Why it was flagged

The local DNF repository example enables a repository while disabling package signature checks. If copied into system configuration, this can affect future package installs from that repository.

Skill content
[mylocalrepo]\nname=My Local Repository\nbaseurl=file:///path/to/repo\nenabled=1\ngpgcheck=0
Recommendation

Prefer signing local repositories and enabling gpgcheck/repo_gpgcheck when the repository is used beyond temporary testing.

What this means

A compromised or misconfigured OS package source could install unsafe tooling.

Why it was flagged

The skill instructs installation of system packages from the user's configured package repositories. This is expected for the skill, but it depends on the trustworthiness of those package sources.

Skill content
dnf install createrepo_c deltarpm ... zypper install createrepo_c ... apt-get install createrepo-c
Recommendation

Install from trusted OS repositories and verify package sources before installing repository-management tools.