Scan Report
5 /100
skill-vetting
Vet ClawHub skills for security and utility before installation. Use when considering installing a ClawHub skill, evaluating third-party code, or assessing whether a skill adds value over existing tools.
skill-vetting is a legitimate security-scanning tool that detects malicious patterns in other skills; all suspicious patterns are either documented examples, the scanner's own detection logic, or external URLs to ClawHub infrastructure.
Safe to install
Approve for installation. This skill adds genuine defensive value over existing tools.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Info | Example malicious URLs in pattern reference doc Doc Mismatch | references/patterns.md:63 |
| Info | Example destructive shell command in pattern reference Doc Mismatch | references/patterns.md:20 |
| Low | Scanner uses base64 module import Obfuscation | scripts/scan.py:9 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | READ | READ | ✓ Aligned | scan.py reads all skill files via Path.read_text() |
| Network | READ | READ | ✓ Aligned | SKILL.md documents curl to clawhub.ai; ARCHITECTURE.md uses same domain |
| Shell | NONE | NONE | — | No shell execution in code; SKILL.md shows curl as example command for human ope… |
| Environment | NONE | NONE | — | scan.py uses argparse for CLI args, not os.environ credential scanning |
| Skill Invoke | NONE | NONE | — | No skill invocation chains found |
| Clipboard | NONE | NONE | — | No clipboard access |
| Browser | NONE | NONE | — | No browser automation |
| Database | NONE | NONE | — | No database access |
1 Critical 6 findings
Critical Dangerous Command 危险 Shell 命令
rm -rf / references/patterns.md:20 Medium External URL 外部 URL
https://clawhub.ai/api/v1/download?slug=SLUG ARCHITECTURE.md:138 Medium External URL 外部 URL
https://clawhub.ai/api/v1/download?slug=SKILL_NAME SKILL.md:15 Medium External URL 外部 URL
https://attacker.com/exfil references/patterns.md:63 Medium External URL 外部 URL
http://random-ip:8080/payload.py references/patterns.md:64 Medium External URL 外部 URL
https://attacker.com references/patterns.md:159 File Tree
5 files · 30.2 KB · 900 lines Markdown 3f · 667L
Python 1f · 232L
JSON 1f · 1L
├─
▾
references
│ └─
patterns.md
Markdown
├─
▾
scripts
│ └─
scan.py
Python
├─
_meta.json
JSON
├─
ARCHITECTURE.md
Markdown
└─
SKILL.md
Markdown
Security Positives
✓ Skill is a legitimate defensive tool (security scanner) with clear value
✓ SKILL.md clearly documents all network endpoints (clawhub.ai only)
✓ Skill explicitly warns AI reviewers about prompt injection before code review
✓ Hard rule declared: CRITICAL prompt_injection findings = automatic rejection
✓ Scanner is immune to prompt injection (regex-based, no LLM)
✓ Architecture doc transparently lists scanner limitations
✓ No shell=True, eval(), exec(), or dynamic code execution in scanner code
✓ All file operations scoped to skill directory being scanned
✓ No credential harvesting or environment variable iteration
✓ Skill self-describes as a vetting tool — behavior matches documentation