Shoofly Basic

ReviewAudited by ClawScan on May 10, 2026.

Overview

Shoofly Basic is mostly consistent with a security-alerting tool, but it asks the agent to persistently log every tool call and references an execution path whose installation/provenance is unclear.

Review the logging behavior before installing. If you use it, restrict logs to summaries, protect ~/.shoofly permissions, verify the notification helper path, and use dedicated notification credentials/channels.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private file contents, command outputs, credentials, or other sensitive information seen during normal agent work could be recorded in a local persistent log.

Why it was flagged

This requires persistent logging around every tool call, including arguments and returned results, but the artifact does not define redaction, retention, or exclusions for secrets/private content.

Skill content
Capture: note the tool name, arguments used, and the result returned ... Log: append every tool call + threat evaluation to `~/.shoofly/logs/alerts.log`
Recommendation

Only log threat summaries by default, redact tokens and private data, document retention and permissions, and let users opt into full tool-call logging.

What this means

Alert delivery may fail or may execute a different local helper than the one included in the reviewed artifact.

Why it was flagged

The skill instructs execution of a helper at ~/.shoofly/bin/shoofly-notify, but the provided file is bin/shoofly-notify.sh and there is no install spec showing how the reviewed file becomes that executable.

Skill content
`telegram`: run `~/.shoofly/bin/shoofly-notify telegram "<alert text>"`
Recommendation

Install the reviewed helper through a clear install step, call it by its packaged path, or verify the target path, ownership, and checksum before the agent runs it.

What this means

Configured messaging accounts can be used to send Shoofly alert messages, and those alerts may reveal the agent name and threat type to the selected channel.

Why it was flagged

The notification helper can read local messaging configuration and use a Telegram bot token to send alert messages, which is expected for a notification feature but involves account authority.

Skill content
bot_token=$(jq -r '.telegram.bot_token // empty' "$CONFIG" ... curl ... "https://api.telegram.org/bot${bot_token}/sendMessage"
Recommendation

Use dedicated low-privilege notification tokens/channels and avoid placing unrelated credentials in ~/.shoofly/config.json.

What this means

When configured, alerts may be sent automatically to terminal, local gateway, Telegram, or WhatsApp channels.

Why it was flagged

The skill instructs automatic notification actions after detections. This is aligned with its security-alerting purpose, but users should understand it can trigger tool/network actions without a separate confirmation each time.

Skill content
If threat detected: fire notification immediately, log it, then continue (Basic does NOT block)
Recommendation

Review notification_channels before enabling the skill and keep automatic delivery limited to channels you trust.

What this means

Security warnings may double as marketing messages, which can make it harder to separate urgent safety information from promotion.

Why it was flagged

The required warning text includes a promotional upsell inside security alerts, which is disclosed but could influence user trust during a security event.

Skill content
Try ⚡🪰⚡ SHOOFLY ADVANCED to block attacks before they're inside your agent infra. shoofly.dev/advanced
Recommendation

Prefer neutral alert text, or make promotional content optional and clearly separate from threat details.