proactive-solvr

clawhub:proactive-solvr

View source
D
37/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

10

Score

37/100

CRITICAL 1
HIGH 2
MEDIUM 1
LOW 6

Findings (10)

CRITICAL
Text combines credential access with network transmission
L58

Text combines credential access with network transmission

Non-technical users never see API keys or webhook config.
FIX

Remove the combination of credential access and network transmission from the tool. If the tool needs credentials, access them via a secrets manager and never transmit them externally.

FP?

Likely FP if the tool legitimately uses credentials for API authentication (e.g., reading an API key to make authenticated requests to the same service).

HIGH
Instruction override attempt
L93

Detects attempts to override or ignore previous instructions

Ignore previous instructions
FIX

Remove the injection payload from the skill definition. Text that attempts to reset agent context or override prior directives is a direct attack vector.

FP?

Likely FP if the text is in a security tutorial or research paper discussing injection techniques as examples, not in an active skill description.

HIGH
Zero-width character obfuscation
L419

Detects zero-width characters used to hide content

FIX

Remove hidden directives embedded in markdown, HTML comments, or encoded text. All agent-facing text should be explicit and visible in the skill definition.

FP?

Likely FP if the match is a standard markdown formatting pattern or HTML comment used for documentation rather than concealing directives.

MEDIUM
Role switching attempt
L94

Detects attempts to make the AI assume a different role

You are now a different
FIX

Remove directives that attempt to alter the agent's behavior or persona. Skill descriptions should describe tool functionality, not contain behavioral commands for the agent.

FP?

Likely FP if the matched text is part of the skill's legitimate system prompt configuration that defines the tool's behavior for the user, not an attack.

LOW
Shell script file execution
L346

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/onboarding-check.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L349

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/config-enforce.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L350

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/config-enforce.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L353

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/solvr-register.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L356

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/security-audit.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L359

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/pre-commit-secrets.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.