The invalid entries aren’t legitimate: they have two login shells. For example,
sync:*:4:65534:sync:/bin:/bin/sync:/usr/sbin/nologin
should only have
sync:*:4:65534:sync:/bin:/bin/sync
All your invalid entries have an extra :/usr/bin/nologin appended. In most cases, if you were to follow the advice in the guide you’re reading, you’d actually replace the last entry:
clamav:x:109:109::/var/lib/clamav:/usr/sbin/nologin
However, for entries already using /bin/false, this makes no practical difference in terms of security; see What's the difference between /sbin/nologin and /bin/false for details.
Your analysis of /etc/shadow fails because pwck expects the first file given to it to be a passwd file, not a shadow file. To analyse a shadow file, you need to provide the corresponding passwd file simultaneously:
pwck -r /etc/passwd /etc/shadow
(This replaces both your commands to analyse /etc/passwd and /etc/shadow in one go.)