pocket-casts-yt

clawhub:pocket-casts-yt

View source
D
45/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

8

Score

45/100

CRITICAL 1
HIGH 2
LOW 5

Findings (8)

CRITICAL
Instruction override combined with dangerous operations
L1

Instruction override combined with dangerous operations

CLAWDBOT_CREDENTIALS - Override credentials directory (default: ~/.clawdbot/credentials)
FIX

Remove language that attempts to override safety guidelines or bypass system-level controls. This pattern is a strong indicator of a jailbreak attempt.

FP?

Likely FP if the matched text is in a security research document or educational content clearly marked as an example rather than an active payload.

HIGH
Download-and-execute
L34

Detects patterns of downloading and piping to shell execution

curl -fsSL https://deno.land/install.sh | sh
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

HIGH
Curl or wget piped to shell
L34

Detects downloading scripts piped directly to a shell interpreter

curl -fsSL https://deno.land/install.sh | sh
FIX

Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.

FP?

Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.

LOW
Shell script file execution
L14

Detects execution of shell script files via bash/sh command or direct invocation

bash
~/skills/pocket-casts/scripts/upload.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L19

Detects execution of shell script files via bash/sh command or direct invocation

bash
~/skills/pocket-casts/scripts/upload.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
System package manager install
L27

Detects system-level package installation via brew, apt, yum, or dnf

apt install f
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
System package manager install
L29

Detects system-level package installation via brew, apt, yum, or dnf

apt install j
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
Chained shell command execution
L34

Detects chained commands using shell operators with dangerous operations

curl -fsSL https://deno.land/install.sh | sh
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.