Security
ClawClawGo scans every kit for common threats. Both push and add run security checks automatically.
What Gets Scanned
The scanner checks for:
- Prompt injection — Instructions that override system prompts
- Shell exfiltration — Commands that send data externally
- Credential access — Attempts to read keys, tokens, or passwords
- PII exposure — Leaking personal information
- Dangerous commands —
rm -rf,curl | bash, etc. - Network access — Unexpected external connections
Trust Score
Every scan produces a score from 0-100:
- 90-100 — Safe to use
- 70-89 — Review findings, use with caution
- Below 70 — High risk, don’t use without thorough review
How It Works
When Adding a Kit
npx clawclawgo add garrytan/gstack
The add command clones the repo, scans all files, and reports findings. If blocking issues are found, it removes the clone and exits unless --force is passed.
When Pushing
npx clawclawgo push
The push command scans your repo and validates the kit against the schema. Kits with blocking issues can’t be pushed.
False Positives
Some legitimate patterns trigger warnings:
- Git clone commands — Flagged as network access
- Package installs — Flagged as shell execution
- API calls — Flagged as external connections
- Documentation mentioning dangerous commands — Flagged even in educational context
If the kit is from a trusted source and the findings make sense, proceed with --force (for add).
Trust Tiers (Web App)
On clawclawgo.com, kits show trust tier badges:
- Verified — Maintained by the ClawClawGo team or verified authors
- Community — Scanned clean, has community traction (10+ stars)
- Unreviewed — New or unverified
Red Flags
- Score below 70
- Credential access attempts
- Obfuscated commands (
eval $(base64 -d ...)) - Unexpected external network calls
- Unknown author
Reporting Issues
Found a malicious kit? Open an issue tagged security at github.com/bolander72/clawclawgo/issues.