First Seen
Feb 18, 2026
Last Scanned
Feb 22, 2026
Findings
3
Score
85/100
Findings (3)
Detects common jailbreak prompt patterns
Bypass filter Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).
Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.
Detects instructions to modify shell config files for environment persistence
Add to ~/.zshrc or ~/.bashrc Avoid modifying shell profiles (.bashrc, .zshrc, .profile) programmatically. Instruct users to add PATH entries manually, or use a version manager (nvm, pyenv) instead.
Likely FP if the match is documentation showing how to add a tool to PATH manually, especially if it only appends to PATH without modifying other settings.
Detects execution of shell script files via bash/sh command or direct invocation
source ~/.openclaw/workspace/skills/oktk/scripts/oktk-aliases.sh Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.
Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.