yoder-skill-auditor

clawhub:yoder-skill-auditor

View source
C
70/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

10

Score

70/100

HIGH 2
LOW 8

Findings (10)

HIGH
Private data read with code execution
L75

Skill can read private data AND execute arbitrary code. This combination enables credential theft via dynamic code.

[reads_private_data] access credentials + [executes_code] eval(
FIX

Add input validation between the user-controlled data source and the security-sensitive sink (e.g., file writes, command execution). Implement allowlisting for acceptable input patterns.

FP?

Likely FP if the user input passes through explicit validation or sanitization before reaching the sensitive operation, and the taint tracker missed the sanitization step.

HIGH
Privilege escalation
L99

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

LOW
Shell script file execution
L32

Detects execution of shell script files via bash/sh command or direct invocation

bash audit.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L45

Detects execution of shell script files via bash/sh command or direct invocation

bash diff-audit.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L48

Detects execution of shell script files via bash/sh command or direct invocation

bash benchmark.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L51

Detects execution of shell script files via bash/sh command or direct invocation

bash inspect.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L54

Detects execution of shell script files via bash/sh command or direct invocation

bash audit-all.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L57

Detects execution of shell script files via bash/sh command or direct invocation

bash report.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L60

Detects execution of shell script files via bash/sh command or direct invocation

bash test.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L147

Detects execution of shell script files via bash/sh command or direct invocation

bash test.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.