Screengrab
Analysis
Screengrab is a straightforward macOS screenshot helper, but its unbounded watch mode can keep capturing sensitive screen contents until stopped.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
watch_p.add_argument('--count', type=int, default=None) ... while count is None or i < count: ... snap(...); ... time.sleep(interval)The periodic screenshot mode has no default maximum count and loops indefinitely when count is not provided, which can continuously capture sensitive screen contents and create many files.
- macOS only (`/usr/sbin/screencapture`) - Script: `scripts/screengrab.py`
The skill text and code require macOS screenshot utilities, while the registry metadata lists no OS restriction and no required binaries, leaving the package contract under-declared.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
path=$(python3 scripts/screengrab.py snap --quiet) # Then pass $path to image analysis
The suggested workflow moves the screenshot into a separate image-analysis component, which may expose sensitive visible screen contents depending on that tool's privacy boundary.
