security-audit-toolkit

clawhub:security-audit-toolkit

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

4

Score

100/100

LOW 4

Findings (4)

LOW
pip install arbitrary package
L47

Detects pip install of arbitrary packages that modify the host environment

pip install pi
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
pip install arbitrary package
L53

Detects pip install of arbitrary packages that modify the host environment

pip install sa
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
go install from remote
L65

Detects go install fetching and compiling arbitrary Go packages

go install golang.org/x/vuln/cmd/govulncheck@
FIX

Pin Go install targets to a specific version (e.g., go install example.com/tool@v1.2.3). Avoid @latest as it fetches whatever is currently published.

FP?

Likely FP if the go install target is a well-known tool (e.g., golang.org/x/ packages) pinned to a specific version in documentation.

LOW
Cargo or gem install from remote
L76

Detects cargo install or gem install fetching packages from remote registries

cargo install c
FIX

Pin Cargo/Gem packages to specific versions (e.g., cargo install tool@0.1.0, gem install tool -v 1.2.3). Use lock files for reproducibility.

FP?

Likely FP if the matched text is a very short fragment (3 words or fewer) or uses placeholder package names.