repo runner

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A repository’s docs could influence what commands the agent proposes or runs, so a hostile repo may try to trick the workflow.

Why it was flagged

The skill intentionally uses untrusted repository documentation to choose setup and run commands. That is purpose-aligned, but a malicious README could try to steer the agent toward unsafe or unrelated actions.

Skill content
get the project running **as its docs intend** ... Prefer `README.md` + `docs/` ... Use the docs’ recommended run target
Recommendation

Keep repo docs untrusted, review the exact command list before execution, and reject instructions that ask for secrets, system-wide changes, or actions unrelated to running the project.

What this means

Running an untrusted project can execute dependency scripts, start services, use network access, consume disk/CPU, or modify files inside the workspace.

Why it was flagged

The workflow can install dependencies, build code, run project commands, and start Docker services from a user-selected repository. This is the core purpose and requires confirmation, but it can execute third-party code locally.

Skill content
Install dependencies (after confirmation, based on project type) ... `npm ci` ... `pip install -r requirements.txt` ... `cargo build` / `cargo test` / `cargo run` ... `docker compose up`
Recommendation

Use this only for repositories you intend to run, prefer an isolated workspace or container, approve dependency installs and Docker use explicitly, and avoid providing secrets unless truly required.