discord-soul

clawhub:discord-soul

View source
D
34/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

9

Score

34/100

CRITICAL 2
MEDIUM 2
LOW 5

Findings (9)

CRITICAL
Instruction override attempt
L68

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

CRITICAL
Jailbreak template
L71

Detects common jailbreak prompt patterns

DAN mode
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

MEDIUM
Sensitive file read pattern
L52

Detects reads of sensitive system or credential files

cat ~/.config
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Prompt leaking attempt
L72

Detects attempts to extract the system prompt

Reveal your system prompt
FIX

Remove directives that attempt to make the agent act autonomously without user confirmation (e.g., automatically running commands, skipping confirmation prompts).

FP?

Likely FP if the matched text is in a CI/CD tool description where automated execution is the intended behavior in a controlled environment.

LOW
Shell script file execution
L23

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/create_agent.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Cron or scheduled command execution
L29

Detects cron jobs or scheduled tasks that execute commands

crontab -e
FIX

Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.

FP?

Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.

LOW
Shell script file execution
L116

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/secure-pipeline.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L242

Detects execution of shell script files via bash/sh command or direct invocation

bash
./scripts/update_agent.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L243

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/update_agent.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.