confidant

clawhub:confidant

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

16

Score

100/100

LOW 16

Findings (16)

LOW
Shell script file execution
L44

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/setup.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L51

Detects execution of shell script files via bash/sh command or direct invocation

bash "$SKILL_DIR/scripts/setup.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L59

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L74

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L101

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L104

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L107

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L110

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L113

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L116

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/request-secret.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L133

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/check-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L134

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/check-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Terminal multiplexer command injection
L148

Detects tmux/screen send-keys used to inject commands into terminal sessions

tmux send-keys 
FIX

Avoid sending unsanitized user input to tmux/screen sessions via send-keys. Use a controlled command dispatch mechanism instead of injecting commands into terminal multiplexers.

FP?

Likely FP if the match is in documentation describing tmux/screen workflow automation for the user themselves, not controlled by an external agent.

LOW
Terminal multiplexer command injection
L152

Detects tmux/screen send-keys used to inject commands into terminal sessions

tmux send-keys 
FIX

Avoid sending unsanitized user input to tmux/screen sessions via send-keys. Use a controlled command dispatch mechanism instead of injecting commands into terminal multiplexers.

FP?

Likely FP if the match is in documentation describing tmux/screen workflow automation for the user themselves, not controlled by an external agent.

LOW
Unverified npx package execution
L257

Detects npx executing packages from unverified sources without pinned versions

npx @aiconnect/confidant`
FIX

Pin the npx package to an exact version (e.g., npx @scope/package@1.2.3). Unversioned npx commands can silently install a different or malicious package version.

FP?

Likely FP if the npx command targets a well-known package in documentation context, though unpinned versions are a real supply chain concern.

LOW
Shell script file execution
L257

Detects execution of shell script files via bash/sh command or direct invocation

bash {skill}/scripts/setup.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.