Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Server Maintenance

v1.0.0

Automates server maintenance by checking disk usage, cleaning caches, optimizing resources, and supporting local and remote multi-server batch operations.

0· 677·2 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The scripts (check.sh, cleanup.sh, maintain-all.sh) implement disk checks, cache cleanup and multi-server SSH operations that match the described purpose. Minor inconsistency: registry metadata lists no required binaries, but SKILL.md lists dependencies (bash, ssh, du, df, npm). Functionality generally aligns with the stated purpose.
!
Instruction Scope
The runtime instructions and scripts will operate as root (ssh root@host and inspect /root), run remote commands, and remove cached directories. The SKILL.md promises safety measures (backups, only cleaning safe caches, dry-run) but the scripts do not implement a pre-operation backup step and only partially implement dry-run behavior. maintain-all.sh directly attempts SSH to hard-coded IPs; check.sh and cleanup.sh inspect /root and other privileged locations. These behaviors expand scope to high-privilege host-level operations.
Install Mechanism
No install spec (instruction-only skill with bundled scripts). Nothing is downloaded or executed from external URLs during install — lower install-time risk. The presence of local script files means code will run on the host when invoked.
!
Credentials
No environment variables or credentials are declared, but the scripts require SSH access as root to remote hosts. The skill ships with a servers.json and maintain-all.sh hard-coded with external IP addresses (43.163.225.27 and 43.167.192.145). maintain-all.sh disables StrictHostKeyChecking (ssh -o StrictHostKeyChecking=no) which weakens host authenticity checks. Asking for root SSH access and embedding remote IPs without clearly asking the user to confirm them is disproportionate and risky.
Persistence & Privilege
The skill is not always-enabled and is user-invocable. It does not request persistent platform privileges or modify other skills. Autonomous invocation is allowed (default), which is normal — combine that with the high-privilege SSH actions in other dimensions when deciding whether to enable autonomous runs.
What to consider before installing
This skill largely implements its stated maintenance tasks, but has a few red flags you should address before running it on production systems: 1) Inspect and edit servers.json and maintain-all.sh: both contain hard-coded remote IPs. Remove or replace them with only servers you control. The bundled maintain-all.sh currently will attempt SSH to those addresses. 2) Root SSH & host-key checking: scripts use ssh root@host and maintain-all.sh sets StrictHostKeyChecking=no. That bypasses host authenticity checks; change this and avoid automatic root access unless you intentionally want it. Prefer connecting as a non-root user with sudo where possible. 3) Verify backup behavior: SKILL.md claims automatic backups of key configs, but the scripts do not perform backups. Add an explicit backup step (and test it) before any destructive operations. 4) Use dry-run and test in an isolated environment: cleanup.sh has a dry-run mode — use it first. Test everything on a disposable VM to confirm effects before running on production. 5) Code review: the scripts run rm -rf on cached directories and perform remote commands. Read and understand each command, and lock down who/what can invoke the skill (do not enable autonomous scheduled runs until you trust it). 6) Source verification: the skill's source is 'unknown' and the package.json points to a GitHub repo — if you plan to use this, verify the upstream repository and its history. If you want, I can produce a hardened version of these scripts that: - reads servers from a user-managed config and refuses to run against unknown hosts, - enforces StrictHostKeyChecking and key-based auth only, - performs safe backups before changes, - runs cleanup actions under a non-root account with sudo prompts. Confidence: high — the scripts are readable and the risky elements (hard-coded IPs, root SSH, disabled host-key checking, missing backups) are concrete and observable.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c42ms267k7g120d5tjeents826m2v

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments