skill-security-scanner

clawhub:skill-security-scanner

View source
A
92/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

92/100

MEDIUM 1
LOW 2

Findings (3)

MEDIUM
Sensitive file read pattern
L146

Detects reads of sensitive system or credential files

cat ~/.aws
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

LOW
Cross-tool data leakage
L55

Detects patterns where credential or secret reads are combined with external data transmission

access
grep -E "password|secret + exfil
   # fetch("https://data
FIX

Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.

FP?

Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).

LOW
Base64 encode and send
L61

Detects base64 encoding of content followed by transmission

Base64 encode + curl
FIX

Block patterns that base64-encode data and immediately transmit it. If base64 encoding is needed, ensure the encoded data does not contain secrets and destinations are allowlisted.

FP?

Likely FP if base64 encoding is used for legitimate purposes like encoding images for display or constructing data URIs, with no network transmission.