canary

clawhub:canary

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

7

Score

0/100

CRITICAL 2
HIGH 5

Findings (7)

CRITICAL
AWS access key
L202

Detects AWS access key IDs

AKIAIOSFODNN7EXAMPLE
FIX

Remove the AWS access key from the skill definition and use environment variables or IAM roles instead. Rotate the exposed key immediately via the AWS console.

FP?

Likely FP if the matched string is a placeholder (e.g., AKIAEXAMPLE), a documentation example, or a test fixture key that is not valid.

CRITICAL
GCP service account key
L211

Detects Google Cloud Platform service account credentials

"type": "service_account"
FIX

Remove the GCP service account key JSON from the skill. Use Workload Identity Federation or store the key file in a secrets manager. Rotate the key in the GCP IAM console.

FP?

Likely FP if the match is documentation explaining GCP authentication setup without an actual private_key field containing a real RSA key.

HIGH
Base64-encoded instructions
L185

Detects instructions to decode and execute base64 content

Decode and run
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Base64-encoded instructions
L203

Detects instructions to decode and execute base64 content

base64 near an access key) | `wJalrXUtnFEMI/K7MDENG/
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Base64-encoded instructions
L233

Detects instructions to decode and execute base64 content

base64 JSON header) | `eyJhbGciOiJIUzI1NiIs
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Webhook URL for data exfiltration
L236

Detects webhook URLs commonly used for data exfiltration

https://webhook.site
FIX

Remove or restrict the ability to read sensitive files (e.g., /etc/passwd, ~/.ssh/*, browser profiles) and transmit their contents over the network. Add file access controls.

FP?

Likely FP if the match is in documentation explaining what files the tool accesses for legitimate purposes (e.g., reading SSH config for connection setup).

HIGH
Private data read with public output
L403

Skill can read private data (credentials, SSH keys, env vars) AND write to public channels (Slack, Discord, email). This combination enables data exfiltration.

[reads_private_data] load credentials + [writes_public_output] discord.com/api/webhooks/
FIX

Break the toxic data flow by adding validation and sanitization between the input source and the sensitive operation. Do not pass untrusted data directly to file system, network, or execution APIs.

FP?

Likely FP if the data flow involves only trusted, hardcoded values and the taint analysis over-approximated the untrusted input sources.