Back to skill
Skillv1.0.1
ClawScan security
Yidun Skill Sec · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
ReviewMar 13, 2026, 10:27 AM
- Verdict
- Review
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's declared purpose (a hybrid local-cloud security scanner) matches its requirements, but important runtime behaviors (local redaction, what snippets are uploaded, and exact file-read scope) are only described in prose with no code to verify — this creates a non-trivial risk of sensitive-data exposure unless you audit or restrict it.
- Guidance
- This skill appears to do what it says (a hybrid local-cloud scanner) and only needs curl/jq/openssl. The main risk is data you may not expect it to send: the SKILL.md says it uploads redacted code snippets and tags to a third‑party endpoint (as.dun.163.com). Because there is no implementation included, you cannot verify the redaction or exact upload rules. Before installing or enabling cloud mode: 1) Prefer running scans offline (set YIDUN_SKILL_SEC_CLOUD=false) on sensitive code or in an isolated environment. 2) If you plan to enable cloud analysis, test it first on non-sensitive packages to confirm what is sent. 3) Ask the author or vendor for the scanner implementation (or review it) to verify the local redaction pipeline and the exact file-read policies. 4) Limit network access (e.g., firewall) if you cannot audit the implementation. 5) If you use this skill in high-sensitivity contexts, require that cloud uploads be disabled or that the vendor provides a signed, auditable client implementation. These steps will reduce the chance that secrets or unexpected data are exfiltrated.
- Findings
[NO_CODE_FILES] expected: This is an instruction-only skill; the regex-based scanner had no code files to analyze. That means claims about local redaction and upload behavior cannot be validated by the static scan.
Review Dimensions
- Purpose & Capability
- okName/description (security scanner) align with required binaries (curl, jq, openssl) and with the SKILL.md: cloud checks, fingerprinting, and static analysis reasonably require network calls and hash computation.
- Instruction Scope
- noteSKILL.md instructs the agent to read package files, compute fingerprints, run behavioral analysis, and upload redacted evidence (hashes, tags, and code snippets) to as.dun.163.com. That is coherent for a scanner, but the redaction pipeline and exact rules for what is/ isn't uploaded are only described textually — there is no code to verify that full sources, credentials, or other sensitive artifacts will never be uploaded. The scanner also mentions detecting accesses to agent memory and sensitive paths; if implemented poorly, the scanning step itself could read sensitive files. Summary: behavior is expected for the purpose, but the absence of verifiable implementation details raises privacy/exfiltration concerns.
- Install Mechanism
- okInstruction-only skill (no install spec, no code files) — this is low-risk from an installation/execution perspective because nothing is written or executed by default. Requires standard CLI tools only; no downloads from arbitrary URLs.
- Credentials
- okThe skill does not request credentials or privileged environment variables. Declared optional env vars (YIDUN_SKILL_SEC_CLOUD, TRUSTED_REGISTRIES, LOG_PAYLOAD) are reasonable for toggling cloud behavior and trusted hosts.
- Persistence & Privilege
- okalways is false and the skill is user-invocable; it does not request persistent system-wide privileges or to modify other skills. Autonomous invocation is allowed by platform default but is not combined with other privilege escalations here.
