ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      chandrasekar-r

      Safety Report

      Security Audit

      @chandrasekar-r

      Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.

      5,042Downloads
      39Installs
      6Stars
      1Versions
      Security & Compliance1,716Networking & DNS1,102DevOps & Infrastructure1,045Legal & Compliance738

      Security Analysis

      medium confidence
      Suspicious0.04 risk

      The skill mostly matches its stated purpose (a filesystem- and system-command-based audit), but there are several mismatches and risky choices — notably hardcoded root paths, broad filesystem access, and an auto-fix mode that can change permissions — that deserve caution before running it in a real environment.

      Feb 11, 20262 files4 concerns
      Purpose & Capabilityconcern

      The skill claims to audit a Clawdbot deployment and ships a Node script that performs filesystem scans and system command checks — that is coherent. However, the script hardcodes CLAWDBOT_DIR = '/root/clawd' and CONFIG_DIR = '/root/clawd/skills/.env' rather than using relative paths or declared configuration. That means the script will attempt to read and potentially modify files under /root, which is a stronger privilege/scope than the SKILL.md implies. This hardcoded root path is unexpected and disproportionate to the stated one-command usage (node skills/security-audit/scripts/audit.cjs) which suggests a local, repo-scoped run.

      Instruction Scopeconcern

      The SKILL.md tells the agent (and user) to run the included script; the script reads many files recursively, runs system commands via execSync (ss/netstat, git), inspects .env and config files, and (per documentation) will alter file permissions and create files when run with --fix. The instructions give the agent broad discretion to scan and modify filesystem state under /root/clawd and to run native tools. The SKILL.md claims checks like 'tokens in command history' but the visible code does not show history scanning yet (script truncated) — there is a possible mismatch between documented checks and implemented ones. Overall the runtime instructions allow reading and changing sensitive files beyond the skill's own directory.

      Install Mechanismok

      This is instruction-only with an included script file and no install spec. No external downloads or package installs are required by the skill metadata, so installation risk is low. The primary risk is the script's runtime behavior rather than any installer.

      Credentialsconcern

      The skill declares no required environment variables or credentials, but the script will scan for API keys, tokens and secrets across files under the hardcoded /root/clawd directory and may read configuration files (e.g., .env). Asking for no credentials is reasonable for a scanner, but the scanner's implicit requirement is access to potentially sensitive files and the ability to change permissions — which is a privilege mismatch relative to the minimal declared requirements.

      Persistence & Privilegenote

      The skill is not force-installed (always:false) and does not request persistent agent-level privileges in metadata. However, it exposes an auto-fix mode that will modify file permissions and create files (e.g., .gitignore) when run. If the agent runs this autonomously, auto-fix could change system state. This combination (autonomous invocation allowed by default + auto-fix operations) is a meaningful risk and should be constrained (e.g., require manual confirmation, run read-only first).

      Guidance

      Do not run this script directly on a production host or as root until you have reviewed it completely. Specific things to do before using: 1) Inspect the full scripts/audit.cjs source (including the truncated portion) to confirm what --fix changes; 2) Note the hardcoded paths (/root/clawd and /root/clawd/skills/.env) — update them to point to the correct deployment path or run in an environment where those paths are safe; 3) Run the audit in read-only mode (no --fix) and redirect output to JSON to review findings first; 4) Execute it inside an isolated test container or VM with limited permissions and backups in place; 5) Search the code for any network calls or exec of untrusted content (execSync usage is expected for local checks but review arguments to ensure no shell-injection or exfiltration commands); 6) Only enable auto-fix after you understand and agree with each remediation step and have backups. If you are uncomfortable auditing the script yourself, ask a trusted sysadmin/security engineer to review before running.

      Latest Release

      v1.0.0

      Initial release: credential scanning, port detection, config validation, file permissions, Docker security checks, auto-fix mode

      Popular Skills

      self-improving-agent

      @pskoett · 1,456 stars

      Gog

      @steipete · 672 stars

      Tavily Web Search

      @arun-8687 · 620 stars

      Find Skills

      @JimLiuxinghai · 529 stars

      Proactive Agent

      @halthelobster · 426 stars

      Summarize

      @summarize · 415 stars

      Published by @chandrasekar-r on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]