Arxiv Batch Reporter
Analysis
The skill mostly matches its arXiv reporting purpose, but its renderer can read or write paths outside the intended run folder if given unsafe filenames.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
if candidate.is_absolute():
return candidate
...
template_text = template_path.read_text()
...
output_path = (base_dir / args.output_file).resolve()
rendered = "\n".join(output_lines).rstrip() + "\n"
output_path.write_text(rendered)The template path may be absolute and the output path is resolved and written without checking that it stays under base_dir, even though the documented workflow is for files under the run directory.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Use all metadata + summary blocks below to produce a hierarchical collection report. ... "#### Full Summary" ... lines.append(paper["summary_text"].rstrip())
The bundle intentionally includes full summary.md contents for model synthesis, so any instructions or misleading text inside those summaries may influence the model-authored report template.
