vigil

clawhub:vigil

View source
D
32/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

5

Score

32/100

HIGH 4
MEDIUM 1

Findings (5)

HIGH
Destructive actions with code execution
L30

Skill has destructive capabilities AND can execute arbitrary code. This combination enables ransomware-like attacks.

[destructive] rm -rf / + [executes_code] eval(
FIX

Isolate security-sensitive operations from untrusted data flows. Use separate execution contexts or privilege levels for operations that handle both user input and sensitive resources.

FP?

Likely FP if the toxic flow analysis connected two unrelated code paths, or if the data undergoes transformation that removes the taint (e.g., parsed as a known enum value).

HIGH
Private data read with code execution
L44

Skill can read private data AND execute arbitrary code. This combination enables credential theft via dynamic code.

[reads_private_data] /etc/shadow + [executes_code] eval(
FIX

Add input validation between the user-controlled data source and the security-sensitive sink (e.g., file writes, command execution). Implement allowlisting for acceptable input patterns.

FP?

Likely FP if the user input passes through explicit validation or sanitization before reaching the sensitive operation, and the taint tracker missed the sanitization step.

HIGH
Path traversal attempt
L44

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

../../../etc/shadow
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Base64-encoded instructions
L46

Detects instructions to decode and execute base64 content

base64 decode, eval
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

MEDIUM
Dynamic code evaluation
L46

Detects eval() or exec() used for dynamic code execution

eval(a
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.