Agentscope Skill

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.autonomous_credential_egress, suspicious.dynamic_code_execution, suspicious.exposed_secret_literal (+1 more)

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may modify local files and contact remote sources even for simple AgentScope questions.

Why it was flagged

This directs the agent to perform network and filesystem operations before the user's actual task, without a clear per-use approval boundary.

Skill content
**CRITICAL**: Before doing anything else, clone or update the AgentScope repository. ... # Clone into this skill directory so that you can refer to it across different sessions
Recommendation

Do not clone or update automatically. Ask the user first, use a user-approved project or temporary directory, and avoid modifying the installed skill directory.

What this means

Future repository changes could change the material the agent relies on, and potentially the code a user is encouraged to run.

Why it was flagged

The skill asks for an external repository update, but the visible instruction does not show a pinned commit, verified source, or install specification.

Skill content
clone or update the AgentScope repository
Recommendation

Pin repository references to a reviewed commit or release, document the source clearly, and avoid automatic updates.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

Downloaded or updated content can remain available to later sessions and may affect later answers.

Why it was flagged

This explicitly creates persistent local state in the skill directory across sessions, with no visible cleanup or retention controls.

Skill content
Clone into this skill directory so that you can refer to it across different sessions
Recommendation

Store reference material outside the skill install path, make persistence optional, and document how to remove it.

What this means

If a user runs the example, the created agent may execute local code or shell commands.

Why it was flagged

The sample shows how to give an AgentScope ReAct agent Python and shell execution tools. This is purpose-aligned framework documentation, but powerful if copied and run.

Skill content
toolkit.register_tool_function(execute_python_code) ... toolkit.register_tool_function(execute_shell_command)
Recommendation

Run such examples only in a sandbox or test environment and do not expose shell/code tools to untrusted prompts.

What this means

Users who run examples may need to provide provider API credentials.

Why it was flagged

The examples use model-provider API keys from environment variables, which is expected for AgentScope model integrations and not shown leaking elsewhere.

Skill content
api_key=os.getenv("DASHSCOPE_API_KEY")
Recommendation

Use least-privilege API keys, keep them in environment variables or a secrets manager, and avoid sharing logs that include credentials.

Findings (6)

critical

suspicious.autonomous_credential_egress

Location
agentscope/examples/agent/a2ui_agent/samples/general_agent/skills/A2UI_response_generator/UI_templete_examples/selection_card.py:24
Finding
Autonomous schedule or loop submits credential-bearing agent output without per-call consent.
critical

suspicious.dynamic_code_execution

Location
agentscope/examples/functionality/long_term_memory/reme/tool_memory_example.py:72
Finding
Dynamic code execution detected.
critical

suspicious.exposed_secret_literal

Location
agentscope/src/agentscope/memory/_long_term_memory/_reme/_reme_long_term_memory_base.py:227
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
agentscope/tests/memory_reme_test.py:54
Finding
File appears to expose a hardcoded API secret or token.
warn

suspicious.nonstandard_network

Location
agentscope/docs/tutorial/en/src/task_realtime.py:369
Finding
WebSocket connection to non-standard port detected.
warn

suspicious.nonstandard_network

Location
agentscope/docs/tutorial/zh_CN/src/task_realtime.py:364
Finding
WebSocket connection to non-standard port detected.