ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      polucas

      Safety Report

      Clawshell

      @polucas

      Human-in-the-loop security layer. Intercepts high-risk commands and requires push notification approval.

      2,314Downloads
      23Installs
      6Stars
      1Versions
      Security & Compliance1,716Notifications & Alerts1,061Design & Prototyping842

      Security Analysis

      medium confidence
      Suspicious0.08 risk

      The skill claims to be a shell-intercepting approval layer but is instruction-only with no implementation or install spec; it asks you to run npm install and to add a tool that doesn't exist, and it references extra credentials — these mismatches warrant caution.

      Feb 11, 20261 files4 concerns
      Purpose & Capabilityconcern

      The skill's stated purpose is to intercept and mediate shell commands (provide clawshell_bash). However, there are no code files and no install spec that would place a clawshell_bash implementation on disk or in PATH. The registry requires only 'node' and Pushover env vars, but nothing in the package actually implements the interception behavior; instructing the agent (and the user) to replace bash with clawshell_bash is not feasible without additional code. This is an incoherence between claimed capability and the actual artifact.

      Instruction Scopeconcern

      SKILL.md tells the agent to use clawshell_bash for ALL shell execution and to log to logs/clawshell.jsonl, and it instructs the user to run `npm install` in a skill directory. Those runtime instructions assume an implementation exists and that npm will install dependencies from a package manifest in that directory — but none is provided. The doc also references alternative Telegram env vars (CLAWSHELL_TELEGRAM_BOT_TOKEN, CLAWSHELL_TELEGRAM_CHAT_ID) that are not declared in the registry metadata. The instructions therefore overreach relative to the actual bundle and give the agent broad directives that cannot be validated from the skill itself.

      Install Mechanismnote

      There is no formal install spec (instruction-only), which is low risk from a supply-chain perspective. However, SKILL.md tells the operator to run `npm install` in /app/workspace/skills/clawshell; because no package files are shipped, this instruction is ambiguous. If a user follows it in a directory that contains a package.json (or if the skill later adds one), that could pull arbitrary npm packages. The absence of a concrete install spec is inconsistent and should be clarified before running installs.

      Credentialsnote

      The declared required env vars (CLAWSHELL_PUSHOVER_USER and CLAWSHELL_PUSHOVER_TOKEN) align with the described use of Pushover for approvals. That is proportionate. However, the documentation also mentions Telegram-related variables that are not listed in the registry metadata; the skill suggests storing tokens in a .env file. Requiring user/app tokens is expected for notification delivery, but you should confirm the exact variables the installed code will read and avoid placing high-privilege credentials in a skill-specific .env without review.

      Persistence & Privilegeok

      The skill does not request always:true and does not declare config paths or other elevated system access. It asks the user to add an entry to TOOLS.md so the agent uses clawshell_bash, which changes agent behavior but is an expected integration step for a tool that mediates shell execution. This is not an unexplained persistence or privilege escalation by itself.

      Guidance

      This skill's description and runtime instructions promise a command-interception tool, but the package contains no implementation or install spec. Do NOT run `npm install` or add the tool to TOOLS.md until you have the actual source code or a vetted package to install. Ask the publisher for: (1) the repository or packaged code that implements clawshell_bash, (2) a clear install script or vetted release URL, and (3) a manifest showing which env vars the code actually reads. If you decide to test it, create isolated environment (container/VM), use limited-scope notification credentials (create a dedicated Pushover app/user), and review any package.json and source files before executing. Because the skill can be invoked by the agent, treat it as able to influence many agent actions — only install after verifying the code.

      Latest Release

      v0.1.0

      Initial release of ClawShell: a human-in-the-loop security layer for shell commands. - Intercepts shell commands, analyzes risk, and requires push notification approval for high-risk actions. - Blocks critical commands automatically; allows medium/low-risk commands based on configurable rules. - Provides tools for secure shell command execution (`clawshell_bash`), status checks, and log retrieval. - Supports Pushover and Telegram for approval notifications. - All command decisions and approvals are logged for audit and debugging. - Highly configurable via environment variables and `config.yaml`, with support for custom risk rules.

      More by @polucas

      Digital Clawatar

      4 stars

      self-improving-agent

      @pskoett · 1,456 stars

      Gog

      @steipete · 672 stars

      Tavily Web Search

      @arun-8687 · 620 stars

      Find Skills

      @JimLiuxinghai · 529 stars

      Proactive Agent

      @halthelobster · 426 stars

      Published by @polucas on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]