agentic-paper-digest-skill

clawhub:agentic-paper-digest-skill

View source
B
84/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

11

Score

84/100

MEDIUM 2
LOW 9

Findings (11)

MEDIUM
Localhost bypass
L56

Detects alternative representations of localhost used to bypass SSRF filters

curl http://127.0.0.1:
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Localhost bypass
L57

Detects alternative representations of localhost used to bypass SSRF filters

curl http://127.0.0.1:
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

LOW
Shell script file execution
L25

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/bootstrap.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L31

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/bootstrap.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L37

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/run_cli.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L43

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/run_cli.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L49

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/run_api.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L63

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/stop_api.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
pip install arbitrary package
L87

Detects pip install of arbitrary packages that modify the host environment

pip install py
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
Runtime URL controlling behavior
L98

Detects URLs fetched at runtime that control or influence agent behavior without pinning

read the configuration from the github repo: https:// + setting
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.

LOW
Shell script file execution
L133

Detects execution of shell script files via bash/sh command or direct invocation

bash "{baseDir}/scripts/stop_api.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.