yula-web-search
Analysis
The web-search purpose is coherent, but the documented command builds Python code from the search query unsafely, so a crafted query could run local code if the workflow is followed.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
QUERY_ENCODED=$(python3 -c "import urllib.parse; print(urllib.parse.quote('$QUERY'))"The query is placed directly inside Python source code passed to python3 -c instead of being passed as an argument. A crafted query containing quotes and Python statements could change what code is executed if the agent follows this workflow.
Extract full content from the top 2-3 most relevant URLs ... Summarize all information into a comprehensive answer
The skill intentionally brings arbitrary webpage text into the agent’s context for summarization. Webpage text is untrusted and may contain instructions aimed at influencing the agent.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Uses multiple public anonymous search services ... Works via direct curl requests from local network
The skill discloses that it sends searches and page fetches to public web services using local curl requests. This is expected for web search, but it means queries and network metadata leave the user’s environment.
