giga-coding-agent

clawhub:giga-coding-agent

View source
C
60/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

60/100

CRITICAL 1
HIGH 1
LOW 1

Findings (3)

CRITICAL
Instruction override combined with dangerous operations
L1

Instruction override combined with dangerous operations

--api-key <key>: override API key (defaults to env vars).
FIX

Remove language that attempts to override safety guidelines or bypass system-level controls. This pattern is a strong indicator of a jailbreak attempt.

FP?

Likely FP if the matched text is in a security research document or educational content clearly marked as an example rather than an active payload.

HIGH
Autonomous agent spawning
L3

Detects autonomous sub-agent or cron-based execution without human oversight

background process + bypass-approval
FIX

Remove directives that force the agent to call specific tools or APIs not required for the skill's stated functionality. Tool calls should be determined by user intent, not embedded directives.

FP?

Likely FP if the skill legitimately needs to call other tools as part of its workflow (e.g., a deployment skill that calls git and cloud CLI tools).

LOW
Global package installation
L125

Detects global installation of packages which affects the host system

npm install -g @
FIX

Replace npm install -g with a local install (npm install --save-dev) or use npx with a pinned version. Global installs modify the system and risk supply chain attacks.

FP?

Likely FP if the global install is for a well-known CLI tool (e.g., typescript, eslint) in setup documentation, though the supply chain risk remains real.