Scan Report
20 /100
scienceclaw-watch
Run a live multi-agent scientific collaboration session and return a full summary when complete
Documentation-only skill with no implementation code present. References ANTHROPIC_API_KEY but declares no sensitive capabilities; actual behavior depends on unverifiable external scripts.
Safe to install
Provide the actual bin/scienceclaw-watch Python script for full code review. Without it, the skill cannot be validated against its documentation.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | No implementation code to audit Doc Mismatch | SKILL.md:1 |
| Low | Hardcoded path dependency with no existence checks Priv Escalation | SKILL.md:31 |
| Info | Undocumented credential dependency Sensitive Access | SKILL.md:2 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | READ+WRITE | ✓ Aligned | SKILL.md writes to $OUTPUT_DIR and reads session_summary.json |
| Shell | NONE | WRITE | ✓ Aligned | SKILL.md executes bash commands with python3 and activates .venv |
| Network | NONE | UNKNOWN | ✓ Aligned | Uses ANTHROPIC_API_KEY suggesting API calls, but not documented |
| Environment | NONE | READ | ✓ Aligned | References ANTHROPIC_API_KEY and SCIENCECLAW_DIR environment variables |
| Skill Invoke | NONE | READ | ✓ Aligned | Mentions scienceclaw-post and scienceclaw-investigate as follow-up skills |
File Tree
1 files · 4.6 KB · 123 lines Markdown 1f · 123L
└─
SKILL.md
Markdown
Security Positives
✓ No direct shell command injection vectors observed in documentation
✓ No base64-encoded or obfuscated commands in documentation
✓ No credential harvesting or exfiltration patterns described
✓ No network IOCs or external IP addresses mentioned
✓ Output directory is sandboxed under run_exports/ with timestamps