ecap-security-auditor

clawhub:ecap-security-auditor

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

24

Score

0/100

CRITICAL 5
HIGH 4
MEDIUM 4
LOW 11

Findings (24)

CRITICAL
Jailbreak template
L322

Detects common jailbreak prompt patterns

developer mode
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Jailbreak template
L326

Detects common jailbreak prompt patterns

disable security
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Jailbreak template
L329

Detects common jailbreak prompt patterns

bypass filter
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Download-and-execute
L472

Detects patterns of downloading and piping to shell execution

curl URL \| bash
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

CRITICAL
Curl or wget piped to shell
L472

Detects downloading scripts piped directly to a shell interpreter

curl URL \| bash
FIX

Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.

FP?

Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.

HIGH
Destructive actions with code execution
L472

Skill has destructive capabilities AND can execute arbitrary code. This combination enables ransomware-like attacks.

[destructive] rm -rf / + [executes_code] exec(
FIX

Isolate security-sensitive operations from untrusted data flows. Use separate execution contexts or privilege levels for operations that handle both user input and sensitive resources.

FP?

Likely FP if the toxic flow analysis connected two unrelated code paths, or if the data undergoes transformation that removes the taint (e.g., parsed as a known enum value).

HIGH
Base64-encoded instructions
L355

Detects instructions to decode and execute base64 content

decode → execute
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Code block labeled "markdown" contains executable content
L436

Code block labeled "markdown" contains executable content

{
  "skill_slug": "example-package",
  "risk_score": 75,
  "result": "unsafe",
  "findings_count": 1,
  "findings": [
    {
      "severity": "critical",
      "pattern_id": "CMD_INJECT_001",
      "t...
FIX

Align the tool description with what the code actually does. If the description says one thing but the code does another, update the description to be accurate or fix the code.

FP?

Likely FP if the NLP analyzer misinterpreted technical jargon or the description accurately describes behavior through domain-specific terminology.

HIGH
Data transmission pattern
L596

Detects patterns indicating sensitive data being sent to external services

send credentials to
FIX

Restrict file reading to the project directory and block outbound network calls that include file contents. Implement file path validation to prevent directory traversal.

FP?

Likely FP if the tool legitimately reads project files and displays them to the user locally, without sending data to external services.

MEDIUM
Prompt leaking attempt
L320

Detects attempts to extract the system prompt

reveal your system prompt
FIX

Remove directives that attempt to make the agent act autonomously without user confirmation (e.g., automatically running commands, skipping confirmation prompts).

FP?

Likely FP if the matched text is in a CI/CD tool description where automated execution is the intended behavior in a controlled environment.

MEDIUM
Prompt leaking attempt
L333

Detects attempts to extract the system prompt

reveal your prompt
FIX

Remove directives that attempt to make the agent act autonomously without user confirmation (e.g., automatically running commands, skipping confirmation prompts).

FP?

Likely FP if the matched text is in a CI/CD tool description where automated execution is the intended behavior in a controlled environment.

MEDIUM
Cron or scheduled command execution
L341

Detects cron jobs or scheduled tasks that execute commands

crontab -e
FIX

Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.

FP?

Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.

MEDIUM
Node.js child process execution
L446

Detects Node.js child_process methods for command execution

child_process.exec(
FIX

Use execFile() or spawn() with explicit argument arrays instead of exec() with a shell string. Validate all inputs before passing to child_process methods.

FP?

Likely FP if the match is in a README code example or package.json script field that runs a well-known CLI tool (e.g., eslint, tsc).

LOW
Shell script file execution
L58

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/verify.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L162

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/verify.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L163

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/verify.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L208

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/upload.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L244

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/register.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L369

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/upload.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Chained shell command execution
L472

Detects chained commands using shell operators with dangerous operations

curl URL \| bash
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
Shell script file execution
L528

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/register.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
External API response used without validation
L534

Detects patterns where external API responses are used directly without validation or sanitization

API Response + automatically and inform the use
FIX

Validate and sanitize all data received from external APIs before using it in tool operations or agent prompts. Implement schema validation and treat API responses as untrusted input.

FP?

Likely FP if the match is a truncated table cell or documentation fragment that mentions API responses in a descriptive context, not actual unvalidated data processing.

LOW
Shell script file execution
L585

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/register.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L594

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/verify.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.