arc-skill-scanner

clawhub:arc-skill-scanner

View source
C
62/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

62/100

HIGH 2
MEDIUM 1

Findings (3)

HIGH
Base64-encoded instructions
L76

Detects instructions to decode and execute base64 content

base64 decode, eval
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Private data read with code execution
L74

Skill can read private data AND execute arbitrary code. This combination enables credential theft via dynamic code.

[reads_private_data] access (credential + [executes_code] Shell=True
FIX

Add input validation between the user-controlled data source and the security-sensitive sink (e.g., file writes, command execution). Implement allowlisting for acceptable input patterns.

FP?

Likely FP if the user input passes through explicit validation or sanitization before reaching the sensitive operation, and the taint tracker missed the sanitization step.

MEDIUM
Shell subprocess with shell=True
L84

Detects subprocess calls with shell=True which enables shell injection

Shell=True
FIX

Replace shell=True with shell=False and pass command arguments as a list. Validate and sanitize all inputs before passing to the shell.

FP?

Likely FP if the match is in documentation describing how subprocess works, or in a comment explaining shell risks rather than actual code.