Back to plugin
Pluginv0.1.0

ClawScan security

Relay Workspace · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 26, 2026, 12:52 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The plugin implements remote workspace file RPCs that match its stated purpose, but the documentation claims additional RPCs and safety checks (notably a root-deletion guard) that the code does not implement — this mismatch and the destructive capabilities warrant caution.
Guidance
This plugin does what it says (exposes workspace file RPCs to Relay) but there are important mismatches and safety gaps you should consider before installing: 1) Documentation claims additional RPCs (stat, rename) that the code does not register — confirm whether you need those and whether the plugin will be updated. 2) The README asserts a "root deletion guard" but the code does not check for or refuse deletion of the workspace root before calling rm(...). That means a connected Relay client that is trusted or compromised could delete large parts of your workspace. 3) Because the plugin allows remote read/write/delete over the gateway, only enable it if you trust the Relay client and the network path; prefer using it in trusted, local-only environments or behind strong authentication. 4) If you plan to use it, ask the maintainer to: implement and test the documented RPCs and explicitly enforce a root-deletion guard, add unit tests for path traversal and root-protection, and consider further access control (e.g., require client authentication or restrict to localhost). If you cannot trust the source, test in an isolated environment and review/patch the code (or decline installation).

Review Dimensions

Purpose & Capability
noteName/description match the code: the plugin exposes workspace file operations (list, read, write, delete) over the gateway for Relay. The code calls api.runtime.agent.resolveAgentWorkspaceDir() and uses Node fs, which is expected for this purpose. However README/SKILL.md advertise six methods (list, read, write, stat, rename, delete) while the code only registers list, read, write, and delete — an inconsistency between claimed capabilities and actual implementation.
Instruction Scope
concernSKILL.md and README claim several security protections (including a root-deletion guard) and six RPCs; the implementation lacks registration for `workspace.rename` and `workspace.stat` and does not implement any explicit check that refuses deleting the workspace root before calling rm(...). Because the plugin grants remote clients the ability to read, overwrite, and recursively delete files in the agent workspace, missing or incorrect safeguards are meaningful and risky.
Install Mechanism
okNo install spec is provided (instruction-only from the registry perspective), and the package only contains small source files and metadata. There are no remote download URLs or archive extracts. This is low risk from an install mechanism perspective.
Credentials
okThe skill requests no environment variables, no credentials, and no config paths outside the agent workspace. That is proportionate to the stated purpose of operating on the agent's workspace directory.
Persistence & Privilege
okFlags are default (always: false, agent-invocable allowed). The plugin does not request elevated or permanent platform privileges. The ability to operate on workspace files is the intended functionality, but that capability is inherently powerful and should be allowed only to trusted clients.