Audit Verification Pipeline

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill describes a Solidity audit verification workflow; its local test commands and GitHub CI example are disclosed and aligned with that purpose.

This skill appears safe for its stated audit-verification purpose. Before using it, make sure Foundry is intentionally installed, run tests only in the correct repository, and review any GitHub Actions workflow before committing it.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the workflow may execute project build/test logic in the local repository.

Why it was flagged

The skill directs the agent/user to run local Foundry build and test commands. This is expected for Solidity audit verification, but it is still local command execution in the project environment.

Skill content
forge build → fix compilation errors ... forge test → check result
Recommendation

Run it only in the intended audit repository, review generated PoC/test files before committing, and use an isolated development environment for untrusted projects.

What this means

If added to a repository, GitHub CI will execute these external actions when the workflow runs.

Why it was flagged

The CI example relies on third-party GitHub Actions referenced by version tags. This is common and purpose-aligned, but it introduces normal CI supply-chain considerations.

Skill content
uses: actions/checkout@v4
      - uses: foundry-rs/foundry-toolchain@v1
Recommendation

Review the workflow before use, consider pinning actions to trusted versions or commit SHAs for sensitive repositories, and keep CI permissions minimal.