symbiont

clawhub:symbiont

View source
C
70/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

20

Score

70/100

HIGH 2
LOW 18

Findings (20)

HIGH
Destructive actions with code execution
L539

Skill has destructive capabilities AND can execute arbitrary code. This combination enables ransomware-like attacks.

[destructive] Delete all + [executes_code] eval(
FIX

Isolate security-sensitive operations from untrusted data flows. Use separate execution contexts or privilege levels for operations that handle both user input and sensitive resources.

FP?

Likely FP if the toxic flow analysis connected two unrelated code paths, or if the data undergoes transformation that removes the taint (e.g., parsed as a known enum value).

HIGH
Private data read with code execution
L1223

Skill can read private data AND execute arbitrary code. This combination enables credential theft via dynamic code.

[reads_private_data] load
- [ ] **Secrets + [executes_code] eval(
FIX

Add input validation between the user-controlled data source and the security-sensitive sink (e.g., file writes, command execution). Implement allowlisting for acceptable input patterns.

FP?

Likely FP if the user input passes through explicit validation or sanitization before reaching the sensitive operation, and the taint tracker missed the sanitization step.

LOW
Mutable GitHub raw content reference
L5

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/dsl-guide.md),
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
MCP code execution tool
L98

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L172

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L449

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L679

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L728

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L834

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L1065

Detects MCP tools that execute arbitrary code

"execute_code"
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L1139

Detects MCP tools that execute arbitrary code

execute_command
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
Agent shell tool usage
L1139

Detects skills instructing agents to use Bash/shell tools for command execution

execute_command(
FIX

Restrict the shell tool to specific allowlisted commands using a command prefix or regex filter. Avoid granting broad shell access in agent tool definitions.

FP?

Likely FP if the skill is a development environment tool where shell access is the intended and documented core feature.

LOW
Dynamic code evaluation
L1164

Detects eval() or exec() used for dynamic code execution

eval(u
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
Mutable GitHub raw content reference
L1326

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/dsl-guide.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L1327

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/dsl-specification.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L1328

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/agents/README.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L1329

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/runtime-architecture.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L1330

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/api-reference.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L1331

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/tool_review_workflow.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L1332

Detects references to raw.githubusercontent.com on mutable branches like main/master

github.com/thirdkeyai/symbiont/blob/main/docs/getting-started.md)
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.