Back to skill
Skillv1.0.0
ClawScan security
Cad Agent 1.0.0 · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 14, 2026, 12:59 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's stated purpose (run build123d in a container and return renders) matches its instructions, but it relies on running arbitrary Python modeling code sent over HTTP to a container built from an external GitHub repo that you cannot inspect here — that combination is risky and requires review before use.
- Guidance
- Before installing/running this skill, review the GitHub repository and Dockerfile it asks you to build. Confirm the server implementation: does it execute received Python code directly? Does the container drop privileges, disable or restrict network access, and avoid mounting sensitive host paths? Run the image in an isolated VM or sandbox, avoid binding to public interfaces, and do not run it as root or with host networking unless you understand the risks. If you cannot inspect the repo or Dockerfile, treat the service as untrusted: run it in disposable infrastructure only and do not provide any secrets or mount sensitive volumes.
- Findings
[no_scan_findings (instruction-only bundle)] expected: The static scanner had no code to analyze because this is an instruction-only skill. That makes auditing the run-time server implementation necessary before trusting it.
Review Dimensions
- Purpose & Capability
- okName/description (CAD rendering server for build123d) align with the runtime instructions: the SKILL.md tells you to build a Docker image and run an HTTP service that accepts build123d code and returns renders.
- Instruction Scope
- concernThe service endpoints accept and execute arbitrary build123d Python code (POST /model/create and /model/modify). That is necessary for the stated purpose, but it means untrusted code will run inside the container. SKILL.md does not provide the server implementation or security guarantees (e.g., sandboxing, no-network, non-root user), so you cannot verify that the container prevents host compromise, network exfiltration, or file access.
- Install Mechanism
- noteThere is no formal install spec in the skill bundle (instruction-only). The instructions direct you to clone and docker-build a GitHub repository (https://github.com/clawd-maf/cad-agent). Because the actual server code / Dockerfile are not included in the skill bundle here, you must inspect that external repository before building/running it.
- Credentials
- okThe skill requests no environment variables, credentials, or config paths — which is proportionate. However, lack of declared credentials doesn't remove risk: the running container could still access host resources or external networks depending on how you run it.
- Persistence & Privilege
- okThe skill isn't marked always:true and doesn't request persistent platform privileges. It does instruct creating and running a container bound to host port 8123, which is normal for a local service but could expose the server if misconfigured.
