Low Risk — Risk Score 10/100
Last scan:20 hr ago Rescan
10 /100
1password
Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.
A legitimate 1Password CLI integration skill with properly documented tmux-based session management for secret retrieval. No malicious behavior, obfuscation, or credential exfiltration detected.
Skill Name1password
Duration30.0s
Enginepi
Safe to install
Skill appears safe for use. Ensure tmux socket directories have appropriate permissions and consider adding version pinning for the 'op' CLI binary.

Findings 2 items

Severity Finding Location
Low
Predictable tmux socket path in /tmp Priv Escalation
Socket files are created in a predictable location under TMPDIR with dynamic session names. While standard practice, this could theoretically be targeted if an attacker has local access.
SOCKET_DIR="${TMPDIR:-/tmp}/clawdbot-tmux-sockets"
→ Consider using more restrictive permissions or private tmux sessions without shared sockets.
SKILL.md:33
Info
CLI version check requires 'op' binary Doc Mismatch
The skill checks for op CLI presence via 'op --version' which implies filesystem READ access to binary path and shell execution privileges.
op --version
→ Document this implicit requirement in the capability declaration.
SKILL.md:18
ResourceDeclaredInferredStatusEvidence
Filesystem WRITE WRITE ✓ Aligned SKILL.md: 'op read --out-file ./key.pem' for SSH key export
Shell WRITE WRITE ✓ Aligned SKILL.md: tmux commands with shell tool send-keys for op CLI interaction
Environment NONE READ ✓ Aligned SKILL.md: 'op run --env-file ./env' reads .env but does not exfiltrate
Skill Invoke NONE NONE No cross-skill invocation detected
Network NONE NONE All network traffic is via the 1Password desktop app integration (out of scope)
1 findings
🔗
Medium External URL 外部 URL
https://developer.1password.com/docs/cli/get-started/
SKILL.md:4

File Tree

4 files · 4.2 KB · 104 lines
Markdown 3f · 99L JSON 1f · 5L
├─ 📁 references
│ ├─ 📝 cli-examples.md Markdown 29L · 720 B
│ └─ 📝 get-started.md Markdown 17L · 994 B
├─ 📋 _meta.json JSON 5L · 128 B
└─ 📝 SKILL.md Markdown 53L · 2.4 KB

Security Positives

✓ No base64-encoded or obfuscated code found
✓ No credential harvesting or API key enumeration detected
✓ No external IP communication or data exfiltration
✓ Documentation accurately reflects implementation behavior
✓ Credentials are accessed through the legitimate 1Password CLI (op), not scraped from environment
✓ Secrets are not logged or exposed to stdout in plaintext
✓ Uses --no-masking flag in op run to respect 1Password's secret masking policy
✓ Fresh tmux session per operation limits session reuse attacks