Optional Strict Instructions 可选择的严格指令

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill is mostly safety-focused, but its included helper script can run powerful sudo shell commands and handles sudo passwords in risky ways.

Treat the written confirmation workflow as useful guidance, but avoid running the included shell script unless it is fixed. Never share your sudo password in chat or as a command argument, and review any delete, sudo, package-install, service, or system-configuration command before allowing it to run.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the helper script is used on an unsafe or attacker-controlled path, it could run commands the user did not intend, possibly with administrator privileges.

Why it was flagged

The file path is interpolated into a shell command string and then reparsed by sh -c. A crafted file name containing shell metacharacters could trigger unintended command execution, potentially under sudo.

Skill content
execute_with_sudo "rm -f \"$file\"" "$sudo_password" ... sudo -- sh -c "$command"
Recommendation

Do not run this helper script as-is for file operations. Replace sh -c string execution with direct argument arrays such as sudo rm -f -- "$file", and avoid accepting arbitrary command strings except in clearly manual workflows.

What this means

A user could accidentally disclose their administrator password to the agent, local logs, or other processes.

Why it was flagged

The script accepts a sudo password and even documents passing it as a command-line argument. Command-line passwords can be exposed through shell history, process listings, terminal logs, or agent transcripts.

Skill content
echo "$password" | sudo -S -- sh -c "$command" ... $0 file-delete /etc/hostname true mypassword
Recommendation

Do not provide sudo passwords to the agent or as command arguments. Prefer a normal interactive sudo prompt in the user's terminal, or have the agent show the command for the user to run manually.