agent-tinman

clawhub:agent-tinman

View source
F
21/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

6

Score

21/100

CRITICAL 1
HIGH 2
MEDIUM 3

Findings (6)

CRITICAL
Jailbreak template
L111

Detects common jailbreak prompt patterns

bypass security
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

HIGH
Instruction override attempt
L269

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

HIGH
Private data read with public output
L72

Skill can read private data (credentials, SSH keys, env vars) AND write to public channels (Slack, Discord, email). This combination enables data exfiltration.

[reads_private_data] cat ~/.ssh + [writes_public_output] send alerts to channel
FIX

Break the toxic data flow by adding validation and sanitization between the input source and the sensitive operation. Do not pass untrusted data directly to file system, network, or execution APIs.

FP?

Likely FP if the data flow involves only trusted, hardcoded values and the taint analysis over-approximated the untrusted input sources.

MEDIUM
Sensitive file read pattern
L72

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L261

Detects reads of sensitive system or credential files

read ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L262

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.