๐Ÿ›ก๏ธ SafeAgentSkills

clawdbot-security-check

ยท v2.2.2

Medium Risk

Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to "run security check", "audit clawdbot", "check security hardening", or "what vulnerabilities does my Clawdbot have". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.

H:3 D:0 A:3 C:1

โš ๏ธ Hazard Flags

EXEC FS_DELETE NET_EGRESS_ANY ACT_POST_PUBLIC PI_WEB PI_DOCUMENTS

๐Ÿ“‹ Capabilities

Execution

  • โœ… Shell execution
  • โŒ Code execution
  • โŒ Install dependencies
  • โŒ Persistence
  • Privilege: user

Filesystem

  • โŒ Read workspace
  • โŒ Write workspace
  • โŒ Read home
  • โŒ Write home
  • โŒ Read system
  • โœ… Delete

Network

  • Egress: any
  • โŒ Ingress

Credentials

  • โŒ Environment vars
  • โŒ Credential files
  • โŒ Browser data
  • โŒ Keychain

Actions

โŒ send messagesโœ… post publicโŒ purchaseโŒ transfer moneyโŒ deployโŒ delete external

๐Ÿ”’ Containment

Level: elevated

Required:
  • APPROVE_POST: Can post publicly
  • SANDBOX_CONTAINER: Code execution capability
Recommended:
  • LOG_ACTIONS: Audit trail for all actions

โšก Risks

Unauthorized tool use: INSTRUCTED_GIT_CLONE_AND_BUILD, TOOL_ABUSE_SYSTEM_MODIFICATION, MCP_SYS_FILE_DESTRUCTION critical

Mitigation: Use pre-built packages or vendored dependencies instead of cloning repos

Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION, SOCIAL_ENG_ANTHROPIC_IMPERSONATION low

Mitigation: Provide clear, detailed description of skill functionality

Tool poisoning: hidden behaviors detected (MCP_TOOL_POISONING_REMOTE_STORAGE) medium

Mitigation: Document all remote data storage. Avoid storing sensitive data externally.

Want a deeper analysis?

This report was generated by static analysis. Get an LLM-powered deep review with behavioral reasoning and attack surface mapping.

๐Ÿง  Deep Analysis โ€” $5.00

๐Ÿšจ Incident Response

Kill switch: Stop the agent process

Containment: Review logs for unexpected actions

Recovery: Depends on skill capabilities

๐Ÿ“„ Raw SSDS JSON click to expand
{
  "meta": {
    "document_id": "ssds:auto:clawdbot-self-security-audit:2.2.2",
    "ssds_version": "0.2.0",
    "scanner_version": "0.4.0+fe6fd9123d50",
    "created_at": "2026-03-05T01:43:58.897Z",
    "created_by": {
      "agent": "safeagentskills-cli/generate-ssds"
    },
    "language": "en",
    "notes": "Auto-generated SSDS. Manual review recommended."
  },
  "skill": {
    "name": "clawdbot-security-check",
    "version": "2.2.2",
    "format": "agent_skill",
    "description": "Perform a comprehensive read-only security audit of Clawdbot's own configuration. This is a knowledge-based skill that teaches Clawdbot to identify hardening opportunities across the system. Use when user asks to \"run security check\", \"audit clawdbot\", \"check security hardening\", or \"what vulnerabilities does my Clawdbot have\". This skill uses Clawdbot's internal capabilities and file system access to inspect configuration, detect misconfigurations, and recommend remediations. It is designed to be extensible - new checks can be added by updating this skill's knowledge.",
    "publisher": "ClawHub",
    "source": {
      "channel": "local"
    },
    "artifact": {
      "sha256": "76b50d155cf0344ba79593fb8d401cba3181b4b248e2854a27327c4dde5c9fec",
      "hash_method": "files_sorted"
    }
  },
  "capabilities": {
    "execution": {
      "can_exec_shell": true,
      "can_exec_code": false,
      "privilege_level": "user",
      "can_install_deps": false,
      "can_persist": false
    },
    "filesystem": {
      "reads_workspace": false,
      "reads_user_home": false,
      "reads_system": false,
      "writes_workspace": false,
      "writes_user_home": false,
      "writes_system": false,
      "can_delete": true
    },
    "network": {
      "egress": "any",
      "ingress": false
    },
    "credentials": {
      "reads_env_vars": false,
      "reads_credential_files": false,
      "reads_browser_data": false,
      "reads_keychain": false
    },
    "services": [],
    "actions": {
      "can_send_messages": false,
      "can_post_public": true,
      "can_purchase": false,
      "can_transfer_money": false,
      "can_deploy": false,
      "can_delete_external": false
    },
    "prompt_injection_surfaces": [
      "web",
      "documents"
    ],
    "content_types": [
      "general"
    ]
  },
  "hazards": {
    "hdac": {
      "H": 3,
      "D": 0,
      "A": 3,
      "C": 1
    },
    "flags": [
      "EXEC",
      "FS_DELETE",
      "NET_EGRESS_ANY",
      "ACT_POST_PUBLIC",
      "PI_WEB",
      "PI_DOCUMENTS"
    ],
    "custom_flags": [
      {
        "code": "PROMPT_INJECTION",
        "name": "Prompt Injection Risk",
        "description": "Contains prompt injection patterns in: SKILL.md"
      },
      {
        "code": "FILE_DELETE",
        "name": "File Deletion",
        "description": "Can delete files in: SKILL.md"
      },
      {
        "code": "TOOL_ABUSE",
        "name": "Unauthorized Tool Use",
        "description": "INSTRUCTED_GIT_CLONE_AND_BUILD, TOOL_ABUSE_SYSTEM_MODIFICATION, MCP_SYS_FILE_DESTRUCTION: Instructs agent to clone and potentially build from source"
      },
      {
        "code": "SOCIAL_ENGINEERING",
        "name": "Social Engineering Risk",
        "description": "SOCIAL_ENG_VAGUE_DESCRIPTION, SOCIAL_ENG_ANTHROPIC_IMPERSONATION: Skill description is too vague or missing"
      },
      {
        "code": "TOOL_POISONING",
        "name": "Tool Poisoning",
        "description": "Hidden secondary behavior detected: MCP_TOOL_POISONING_REMOTE_STORAGE"
      }
    ],
    "confidence": {
      "level": "medium",
      "basis": [
        "static_analysis"
      ],
      "notes": "Detected 5 security patterns (7 vendored rule hits). Review recommended."
    },
    "rationale": {
      "H": "H3: Shell/code execution or persistence detected",
      "D": "D0: No sensitive data access",
      "A": "A3: External actions (deploy/message/post)",
      "C": "C1: General content"
    }
  },
  "containment": {
    "level": "elevated",
    "required": [
      {
        "control": "APPROVE_POST",
        "reason": "Can post publicly"
      },
      {
        "control": "SANDBOX_CONTAINER",
        "reason": "Code execution capability"
      }
    ],
    "recommended": [
      {
        "control": "LOG_ACTIONS",
        "reason": "Audit trail for all actions"
      }
    ],
    "uncontained_risk": "Risk level depends on manual review of actual capabilities."
  },
  "risks": {
    "risks": [
      {
        "risk": "Unauthorized tool use: INSTRUCTED_GIT_CLONE_AND_BUILD, TOOL_ABUSE_SYSTEM_MODIFICATION, MCP_SYS_FILE_DESTRUCTION",
        "severity": "critical",
        "mitigation": "Use pre-built packages or vendored dependencies instead of cloning repos"
      },
      {
        "risk": "Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION, SOCIAL_ENG_ANTHROPIC_IMPERSONATION",
        "severity": "low",
        "mitigation": "Provide clear, detailed description of skill functionality"
      },
      {
        "risk": "Tool poisoning: hidden behaviors detected (MCP_TOOL_POISONING_REMOTE_STORAGE)",
        "severity": "medium",
        "mitigation": "Document all remote data storage. Avoid storing sensitive data externally."
      }
    ],
    "limitations": [
      "Static analysis only - runtime behavior not verified"
    ]
  },
  "incident_response": {
    "kill_switch": [
      "Stop the agent process"
    ],
    "containment": [
      "Review logs for unexpected actions"
    ],
    "recovery": [
      "Depends on skill capabilities"
    ]
  },
  "evidence": [
    {
      "evidence_id": "EV:file-1",
      "type": "file_excerpt",
      "title": "_meta.json",
      "file_path": "_meta.json"
    },
    {
      "evidence_id": "EV:file-2",
      "type": "file_excerpt",
      "title": "README.md",
      "file_path": "README.md"
    },
    {
      "evidence_id": "EV:file-3",
      "type": "file_excerpt",
      "title": "SKILL.md",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-1",
      "type": "file_excerpt",
      "title": "INSTRUCTED_GIT_CLONE_AND_BUILD [MEDIUM] README.md:40: git clone https://github.com/TheSethRose/Clawdbot-Security-Check.git",
      "file_path": "README.md"
    },
    {
      "evidence_id": "EV:cisco-2",
      "type": "file_excerpt",
      "title": "MCP_TOOL_POISONING_REMOTE_STORAGE [MEDIUM] README.md:69: - Secures state files including credentials and auth profiles",
      "file_path": "README.md"
    },
    {
      "evidence_id": "EV:cisco-3",
      "type": "file_excerpt",
      "title": "TOOL_ABUSE_SYSTEM_MODIFICATION [CRITICAL] SKILL.md:163: chmod 700 ~/.clawdbot",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-4",
      "type": "file_excerpt",
      "title": "SOCIAL_ENG_VAGUE_DESCRIPTION [LOW] SKILL.md:1: ---",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-5",
      "type": "file_excerpt",
      "title": "SOCIAL_ENG_ANTHROPIC_IMPERSONATION [MEDIUM] SKILL.md:313: cat ~/.clawdbot/clawdbot.json | grep -i \"model|anthropic\"",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-6",
      "type": "file_excerpt",
      "title": "MCP_TOOL_POISONING_REMOTE_STORAGE [MEDIUM] SKILL.md:457: - Secures state files including credentials and auth profiles",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-7",
      "type": "file_excerpt",
      "title": "MCP_SYS_FILE_DESTRUCTION [CRITICAL] SKILL.md:397: - Are these patterns included: `rm -rf`, `curl |`, `git push --force`, `mkfs`, f",
      "file_path": "SKILL.md"
    }
  ]
}