Back to skill
Skillv0.1.0
ClawScan security
Go Vuln Auth Bypass · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 14, 2026, 8:16 AM
- Verdict
- Benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- An instruction-only auditing checklist for Go authentication/authorization issues; its requirements, instructions, and artifacts are consistent with that purpose and it does not request credentials or install code.
- Guidance
- This skill is an offline checklist and code-search patterns for auditing Go auth/authorization issues and appears internally consistent. Before installing or granting an agent access: (1) ensure the agent is only given access to the repository or files you want audited (the skill's checks operate on local source), (2) review references/cases.md if you want concrete examples, and (3) if you prefer manual control, invoke the skill only when needed (it is not always-enabled). There are no required credentials or remote installs, so the direct technical risk from the skill itself is low.
Review Dimensions
- Purpose & Capability
- okThe name/description describe auditing Go auth/authorization flows and the artifact is a detailed checklist and grep/search patterns for exactly that task. No unrelated binaries, env vars, or external services are requested.
- Instruction Scope
- okSKILL.md contains static guidance and concrete repo-local grep/search/check steps for auditing Go code, plus a references file of real cases. It does not instruct the agent to read unrelated system files, exfiltrate data, or call external endpoints.
- Install Mechanism
- okNo install spec or code files — instruction-only. Nothing will be downloaded or written to disk by an install step.
- Credentials
- okThe skill declares no required environment variables, credentials, or config paths. The guidance operates on repo-local source code, so no external secrets are needed.
- Persistence & Privilege
- okalways is false and there is no install-time persistence. The skill is user-invocable and allows model invocation (platform default) but does not request elevated or permanent privileges.
