gog-safetyBuild and deploy safety-profiled gogcli binaries with compile-time command removal. Use when setting up gog for an AI agent with restricted permissions — cho...
Install via ClawdBot CLI:
clawdbot install brennerspear/gog-safetyGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Accesses system directories or attempts privilege escalation
sudo mvCalls external URL not in known-safe list
https://github.com/steipete/gogcli/pull/366AI Analysis
The skill's core function is to build a restricted version of a legitimate CLI tool by removing commands at compile-time, which is a security-enhancing action. The primary risk is the deployment script's use of `sudo` for binary replacement, which is a standard system administration task but requires user trust in the remote host. No evidence of data exfiltration, credential harvesting, or hidden malicious instructions exists.
Audited Apr 16, 2026 · audit v1.0
Generated Mar 22, 2026
An AI agent uses the L1 safety profile to draft and organize emails without sending them, ideal for customer service teams where agents need to prepare responses but require human review before dispatch. This ensures no accidental email sends while streamlining workflow.
Teams deploy the L2 safety profile to allow AI agents to comment on emails and manage RSVPs for project coordination, such as scheduling meetings or tracking task updates, without granting full email sending capabilities. This enhances collaboration while maintaining security in fast-paced environments.
A content platform uses the L3 safety profile to enable AI agents with full write access for generating and sending newsletters or updates, but blocks dangerous admin commands to prevent unauthorized system changes. This supports automated content distribution safely.
DevOps teams build and deploy safety-profiled gog binaries to remote hosts like AWS Graviton instances using cross-compilation, ensuring AI agents on cloud servers have restricted command access. This minimizes risk in automated deployment pipelines.
Offer a subscription-based service providing pre-built safety-profiled gog binaries and deployment tools, helping companies integrate secure AI agents without in-house development. Revenue comes from monthly fees based on usage tiers and support levels.
Provide consulting services to tailor safety profiles and deployment scripts for specific client needs, such as custom YAML configurations for unique command sets. Revenue is generated through project-based contracts and ongoing maintenance agreements.
Monetize by offering paid training workshops, documentation, and premium support for organizations using the open-source gog safety tools, focusing on best practices for AI agent integration. Revenue streams include training fees and support subscriptions.
💬 Integration Tip
Start by testing the L1 profile in a staging environment to verify blocked commands before deploying to production, ensuring the AI agent's permissions align with your security policies.
Scored Apr 19, 2026
Security vetting protocol before installing any AI agent skill. Red flag detection for credential theft, obfuscated code, exfiltration. Risk classification L...
Security-first skill vetting for AI agents. Use before installing any skill from ClawdHub, GitHub, or other sources. Checks for red flags, permission scope,...
Comprehensive security auditing for Clawdbot deployments. Scans for exposed credentials, open ports, weak configs, and vulnerabilities. Auto-fix mode included.
Audit codebases and infrastructure for security issues. Use when scanning dependencies for vulnerabilities, detecting hardcoded secrets, checking OWASP top 10 issues, verifying SSL/TLS, auditing file permissions, or reviewing code for injection and auth flaws.
Audit a user's current AI tool stack. Score each tool by ROI, identify redundancies, gaps, and upgrade opportunities. Produces a structured report with score...
Detect anomalies and outliers in construction data: unusual costs, schedule variances, productivity spikes. Statistical and ML-based detection methods.