clawd-modifier

Warn

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: Modifies the source code of the Claude Code CLI tool (cli.js) located in system-wide directories like /opt/node22/lib/node_modules/.- [COMMAND_EXECUTION]: Performs binary patching on the compiled claude executable using scripts/patch_binary.py to alter hardcoded byte sequences.- [COMMAND_EXECUTION]: Targets files in protected system paths such as /usr/local/bin/ and /opt/homebrew/bin/, which typically requires administrative (sudo) privileges.- [COMMAND_EXECUTION]: Suggests manual use of sed and cp on application source files, which can lead to tool instability or unintended code changes.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 4, 2026, 02:22 AM