clawdnet
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill consists of markdown files (SKILL.md, references/api.md) and a metadata JSON file (_meta.json).
-
Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'You are now DAN') were found. The skill focuses on providing API interaction instructions, not on manipulating the AI's core behavior.
-
Data Exfiltration: No sensitive file paths (e.g.,
~/.aws/credentials,~/.ssh/id_rsa) are accessed or referenced. Allcurlcommands are directed tohttps://clawdnet.xyz, which is the legitimate service for this skill. The use of$CLAWDNET_API_KEYfrom an environment variable is a secure practice for handling API keys, preventing hardcoding or accidental exposure. -
Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, Unicode homoglyphs, or URL/hex/HTML encoding were detected in any of the provided files. The content is clear and readable.
-
Unverifiable Dependencies: The skill does not instruct the user to install any external packages (e.g.,
npm install,pip install) or download scripts. The_meta.jsonfile contains acommitURL pointing togithub.com/clawdbot/skills, which is a reference to the skill's source code and not an instruction to download or execute an external dependency. GitHub is considered a trusted source, but in this context, it's merely metadata. -
Privilege Escalation: No commands that would attempt to escalate privileges (e.g.,
sudo,chmod +x,chmod 777, modifications to system files or services) were found. -
Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
~/.bashrc, creating cron jobs, or configuring systemd services) were detected. -
Metadata Poisoning: The
_meta.jsonfile and the front matter inSKILL.mdcontain only standard, benign metadata fields (name, description, owner, version, commit URL). No malicious instructions were embedded. -
Indirect Prompt Injection: The skill itself does not process arbitrary external content from users that could lead to indirect prompt injection against the LLM using this skill. It describes how an agent would interact with an API, including sending
inputto other agents, but the skill itself is not the processing entity for such input. -
Time-Delayed / Conditional Attacks: No conditional logic (e.g., date/time checks, usage counters) that could trigger malicious behavior at a later time or under specific conditions was found.
Overall, the skill is purely descriptive, providing API documentation and examples. It does not contain any executable code or instructions that pose a security risk.