Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
arch-optimization
v1.0.0OpenClaw通信协议架构优化技能包 - 提供高性能、可靠的agent间通信框架。实现大消息59%性能提升,MessagePack 35%体积减少,统一传输层架构,智能路由算法,完整错误恢复和监控体系。
⭐ 0· 57·0 current·0 all-time
by木南@21b-a
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (agent-to-agent transport, MessagePack, routing, retries) match the included code: core/transport-layer.js, protocol-layer.js, unified-api.js and supporting tests/examples and reports. There are no obvious unrelated dependencies or credential requests in the manifest.
Instruction Scope
SKILL.md and README instruct copying files and running local tests. The included test scripts and examples perform filesystem writes/reads (creating inbox/outbox directories, writing JSON files) and cleanup operations. Tests reference absolute hard-coded paths (e.g. /home/kali/.openclaw/workspace/agent_comm, inboxDir: '~/workspace/agent_comm/inbox') that are inconsistent and could cause writes to unexpected locations on your machine. While filesystem I/O is part of the stated transport design, the hard-coded user path and test cleanup behavior are surprising and increase risk if run directly.
Install Mechanism
No install spec / remote downloads are present; the skill is instruction-only but ships complete source and a local packaging script (pack-delivery.sh). There are no network fetch steps in the manifest, so risk from arbitrary remote code fetch is low. The packaging script just copies and zips local files.
Credentials
The skill declares no environment variables or credentials, which is appropriate. However, multiple files hard-code absolute filesystem locations (notably '/home/kali/...') and assume a particular home directory layout. That is disproportionate because the skill will read/write those paths without asking for configuration, and the SKILL.md does not clearly document or parameterize where tests will create files. No external credentials are requested.
Persistence & Privilege
The skill is not always-enabled and does not request platform-level privileges. It doesn't attempt to modify other skills or global agent configuration in the provided files. The main persistence concern is ordinary file creation by tests and runtime transports (inbox/outbox/processed dirs) which is expected for a filesystem transport.
What to consider before installing
What to check and do before installing/running:
1) Inspect and edit filesystem paths: Search all core/, tests/, and examples/ for hard-coded paths like '/home/kali' or '~/workspace'. Replace them with a safe, explicit directory you control (e.g., a temp directory) or make them configurable. Tests will create, write and delete files; do not run them against your real home or production directories.
2) Run in an isolated environment: Execute tests and examples inside a disposable container, VM, or chroot where file writes are acceptable and cannot touch important data.
3) Grep for network calls / hidden endpoints: Even though the visible files show no external upload, scan the entire codebase for http(s), fetch, net/socket usage, hard-coded hostnames, or telemetry endpoints before giving it network access.
4) Backup and review: If you plan to integrate into a live agent, review core/unified-api.js and transport-layer.js to confirm behavior for retries, fallback, and where logs/stats are written. Back up any directories that might be overwritten.
5) Limit privileges: Run with a user account that has limited permissions for the directories used by the skill. Avoid running as root.
6) Ask for provenance: The source is 'unknown'. Prefer code from a known maintainer or canonical repository. If possible obtain the package from the project's official release/repo and verify checksums.
If you want, I can:
- point to exact lines/files where the hard-coded paths appear,
- produce a short patch to parameterize the inbox/outbox paths, or
- search the codebase for network calls and report findings (I can do that if you grant me the rest of the files or ask me to scan specific files).Like a lobster shell, security has layers — review code before you run it.
latestvk973he7mypkghnvksdtkv9mzcn83csv8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
