skill-scan
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): Multiple files within the
test-fixturesdirectory contain confirmed RCE patterns. For example,test-fixtures/obfuscation-base64/process.pyandtest-fixtures/evasive-08-reverse-shell/debug.shusecurl | bashto execute remote scripts.test-fixtures/backdoor-magic-string/process.pydownloads a payload fromc2.attacker.example.comand executes it usingexec(). - [DATA_EXFILTRATION] (CRITICAL): Fixtures such as
behavioral-multi-file-exfilanddata-exfil-env-secretsimplement full exfiltration chains. These scripts harvest sensitive environment variables and AWS credentials, encode them in Base64, and transmit them to external domains includingattacker.example.comandevil.example.com. - [PROMPT_INJECTION] (HIGH): The skill package contains numerous prompt injection samples in
SKILL.mdfiles withintest-fixtures. These include system overrides (e.g.,prompt-injection-jailbreak), hidden instructions using XML-like tags (e.g.,malicious-skill), and social engineering roleplay (e.g.,evasive-10-roleplay). - [COMMAND_EXECUTION] (MEDIUM): The core auditing tool logic in
skill_scan/clawhub.pyandskill_scan/cli.pymakes extensive use ofsubprocess.check_outputandsubprocess.runto interact with theclawhubandopenclawCLIs. Although implemented with list-based arguments to prevent shell injection, this remains a high-privilege capability. - [OBFUSCATION] (MEDIUM): Several test fixtures utilize obfuscation to hide malicious intent. Examples include
test-fixtures/evasive-02-encoded/index.jsusing hex-encoded strings forchild_processandtest-fixtures/evasive-03-prompt-subtle/SKILL.mdembedding Base64 instructions in image alt-text metadata. - [DATA_EXPOSURE] (LOW): The
alignment_analyzer.pyandllm_analyzer.pymodules ingest untrusted skill content and interpolate it into LLM prompts for analysis. While the implementation uses random hex delimiters as a boundary marker to mitigate indirect prompt injection, this ingestion point represents a known vulnerability surface.
Recommendations
- HIGH: Downloads and executes remote code from: https://debug-tools.net/diag.sh, https://attacker.example.com/install.sh, https://c2.attacker.example.com/payload - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata