bort-agent

clawhub:bort-agent

View source
B
75/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

6

Score

75/100

CRITICAL 1
LOW 5

Findings (6)

CRITICAL
Fake system prompt
L16

Detects content pretending to be a system prompt

system prompt
-
FIX

Remove encoded or obfuscated directives (base64, ROT13, unicode escapes, hex-encoded text). All text should be in plaintext and human-readable.

FP?

Likely FP if the encoded content is legitimate data (e.g., a base64-encoded image, a hex-encoded binary hash) rather than concealed directives.

LOW
Shell script file execution
L33

Detects execution of shell script files via bash/sh command or direct invocation

bash
{baseDir}/scripts/send-message.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L44

Detects execution of shell script files via bash/sh command or direct invocation

bash
{baseDir}/scripts/send-message.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L50

Detects execution of shell script files via bash/sh command or direct invocation

bash
{baseDir}/scripts/agent-status.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L68

Detects execution of shell script files via bash/sh command or direct invocation

bash
{baseDir}/scripts/health.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L85

Detects execution of shell script files via bash/sh command or direct invocation

bash
{baseDir}/scripts/query-agent.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.