Skip to content
← Registry
Trust Report

security-auditor

Use when reviewing code for security vulnerabilities, implementing authentication flows, auditing OWASP Top 10, configuring CORS/CSP headers, handling secrets, input validation, SQL injection prevention, XSS protection, or any security-related code review.

74
REJECTED
Format: openclawScanner: v0.8.0Duration: 12msScanned: 8d ago · May 2, 1:35 PMSource →
Embed this badge
AgentVerus REJECTED 74AgentVerus REJECTED 74AgentVerus REJECTED 74
[![AgentVerus](https://agentverus.ai/api/v1/skill/8d0582e4-dcd9-41f8-86b3-0412bedd4553/badge)](https://agentverus.ai/skill/8d0582e4-dcd9-41f8-86b3-0412bedd4553)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/8d0582e4-dcd9-41f8-86b3-0412bedd4553/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"8d0582e4-dcd9-41f8-86b3-0412bedd4553","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/8d0582e4-dcd9-41f8-86b3-0412bedd4553/trust

Category Scores

77
Permissions
100
Injection
92
Dependencies
70
Behavioral
65
Content
75
Code Safety

Findings (8)

criticalShell command execution via child_process-25

Direct shell execution (exec/spawn) detected. Skills should not execute arbitrary shell commands — this enables command injection, privilege escalation, and lateral movement.

const result = exec(`ls ${userInput}`)

Review the code block starting at line 120. Ensure this pattern is necessary and does not pose a security risk.

code-safetyASST-03
highBrowser auth state handling detected-15

Found browser auth state handling pattern: "HttpOnly cookie" Related auth/profile context: - auth/session capability-contract context — Capability contract mismatch: inferred credential access is not declared

- [ ] HttpOnly cookies for session tokens

Avoid storing, exporting, or passing browser auth state unless the workflow clearly requires it. Prefer encrypted storage, short-lived state, and explicit user confirmation before reusing credentials.

behavioralASST-05
mediumCapability contract mismatch: inferred package bootstrap is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: package.json

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumPackage-managed project bootstrap dependency-8

The skill bootstraps a package-managed project structure, which adds supply-chain exposure through manifest files, build configuration, and package-manager workflows.

package.json

Review which external services or providers the skill depends on, what data crosses that boundary, and whether the dependency is necessary for the intended workflow.

dependenciesASST-04
mediumHigh-risk workflow lacks explicit safety boundaries-15

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
mediumFederated auth flow detected-10

Found federated auth flow pattern: "OAuth"

- OAuth

Treat OAuth, 2FA, and token-refresh guidance as authentication-sensitive workflows. Explain scope, storage, and refresh behavior clearly so agents do not handle more credential material than necessary.

behavioralASST-05
mediumPackage bootstrap execution detected (inside code block)-5

Found package bootstrap execution pattern: "npx better-npm-audit"

npx better-npm-audit audit

Surface package bootstrap commands for review. Ephemeral package execution and install-time dependency pulls increase supply-chain risk, especially when versions are not pinned or provenance is unclear.

behavioralASST-04
lowUnknown external reference (threat documentation)

The skill references an unknown external domain which is classified as low risk.

https://api.example.com

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04