feelgoodbot

clawhub:feelgoodbot

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

5

Score

100/100

LOW 5

Findings (5)

LOW
System package manager install
L27

Detects system-level package installation via brew, apt, yum, or dnf

brew install g
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
go install from remote
L34

Detects go install fetching and compiling arbitrary Go packages

go install github.com/kris-hansen/feelgoodbot/cmd/feelgoodbot@
FIX

Pin Go install targets to a specific version (e.g., go install example.com/tool@v1.2.3). Avoid @latest as it fetches whatever is currently published.

FP?

Likely FP if the go install target is a well-known tool (e.g., golang.org/x/ packages) pinned to a specific version in documentation.

LOW
Dynamic code evaluation
L181

Detects eval() or exec() used for dynamic code execution

exec("
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
Dynamic code evaluation
L198

Detects eval() or exec() used for dynamic code execution

exec("
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
Dynamic code evaluation
L205

Detects eval() or exec() used for dynamic code execution

exec("
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.