Skip to content
← Registry
Trust Report

tinman

AI security scanner with active prevention - 168 detection patterns, 288 attack probes, safer/risky/yolo modes, agent self-protection via /tinman check, local Oilcan event streaming, and plain-language dashboard setup via /tinman oilcan

81
CONDITIONAL
Format: openclawScanner: v0.8.0Duration: 11msScanned: 6d ago · May 5, 4:41 AMSource →
Embed this badge
AgentVerus CONDITIONAL 81AgentVerus CONDITIONAL 81AgentVerus CONDITIONAL 81
[![AgentVerus](https://agentverus.ai/api/v1/skill/24ab46fb-6048-44e4-88d5-00950f9ba579/badge)](https://agentverus.ai/skill/24ab46fb-6048-44e4-88d5-00950f9ba579)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/24ab46fb-6048-44e4-88d5-00950f9ba579/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"24ab46fb-6048-44e4-88d5-00950f9ba579","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/24ab46fb-6048-44e4-88d5-00950f9ba579/trust

Category Scores

66
Permissions
84
Injection
92
Dependencies
75
Behavioral
65
Content
100
Code Safety

Findings (12)

mediumCapability contract mismatch: inferred file write is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Writes sweep report to `~/.openclaw/workspace

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: exec

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://x.com/cantshutup_

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
mediumCapability contract mismatch: inferred package bootstrap is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: npm install

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCredential access detected (inside code block)-8

Found credential access pattern: "cat ~/.ssh/id_rsa"

/tinman check bash "cat ~/.ssh/id_rsa" # Returns: BLOCKED (S4)

Remove references to credentials and secrets. Skills should never access sensitive authentication data.

injectionASST-05
mediumCredential access detected (inside code block)-8

Found credential access pattern: "~/.ssh/id_rsa"

/tinman check bash "cat ~/.ssh/id_rsa" # Returns: BLOCKED (S4)

Remove references to credentials and secrets. Skills should never access sensitive authentication data.

injectionASST-05
mediumFinancial/payment actions detected-10

Found financial/payment actions pattern: "Wallet"

- `financial_transaction` (26): Wallet/seed theft, transactions, exchange API keys (alias: `financial`)

Financial actions should always require explicit user confirmation and should be clearly documented.

behavioralASST-09
mediumHigh-risk workflow lacks explicit safety boundaries-15

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
mediumMany external URLs referenced (4)-8

The skill references 4 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://github.com/oliveskin/openclaw-skill-tinman, https://api.com, https://x.com/cantshutup_, https://github.com/oliveskin/

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
mediumAutonomous action without confirmation detected-10

Found autonomous action without confirmation pattern: "without consent"

- `unauthorized_action` (28): Actions without consent, implicit execution

Require user confirmation before performing destructive or irreversible actions.

behavioralASST-09
mediumPackage bootstrap execution detected (inside code block)-5

Found package bootstrap execution pattern: "npm install"

/tinman allow "npm install" --type patterns # Allow pattern

Surface package bootstrap commands for review. Ephemeral package execution and install-time dependency pulls increase supply-chain risk, especially when versions are not pinned or provenance is unclear.

behavioralASST-04
lowUnknown external reference (threat documentation)

The skill references an unknown external domain which is classified as low risk.

https://api.com

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04