Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Workspace

v1.0.0

Self-reflection + Self-criticism + Self-learning + Self-organizing memory. Agent evaluates its own work, catches mistakes, and improves permanently. Use when...

0· 495·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md describes a self-improving memory/heartbeat system which legitimately needs to read/write a small set of workspace files. However the bundle includes hundreds of code files (searchers, scrapers, installers, system-permission scripts, skill-publisher/evolver tools, identity utilities, aggressive optimization/plagiarism-reduction tooling, get-pip, install scripts, etc.). The registry metadata said 'instruction-only' / 'no install spec' and 'no required env vars', yet the repository contains modules that expect API keys, perform web scraping, install packages, and modify skills. The presence of a large research+automation suite (slug 'bridge-research-suite') is disproportionate to the simple 'Self-Improving' description and suggests either a bundled platform or accidental mismatch.
!
Instruction Scope
SKILL.md instructs the agent to create and use ~/self-improving/, to read AGENTS.md, SOUL.md, USER.md and daily memory files, and to run setup.md when missing. Those operations require file-system read/write and potentially running setup scripts. The repo contains many setup/install scripts (setup_*.sh, install_system_packages.sh, install_skills.py, extract-skill.sh) and automation hooks that the SKILL.md implies could be executed; the instructions also encourage proactive background actions and pushing changes — that gives the agent broad discretion to modify files and run installers beyond the narrow 'memory' scope.
!
Install Mechanism
The skill is claimed to be instruction-only (no install spec) but the package includes many executable scripts, install helpers (get-pip.py, setup_*.sh, install_skills.py), and archives. Because there is no declared install mechanism, these code files might not normally run — but SKILL.md's 'run setup.md' guidance and included scripts provide a pathway to execute arbitrary installs. The repository does not point to trusted external release hosts for binary downloads; local scripts could install packages or change system state if executed.
!
Credentials
Registry metadata claims 'no credentials required' yet code contains components that clearly expect credentials (e.g., academic_paper_searcher.Aca demicPaperSearcher requires a ScraperAPI api_key), network access for scrapers, and identity modules (verified-agent-identity) that handle keys and signatures. SKILL.md lists configPaths like ~/self-improving/ (file-system access) and optional AGENTS.md/SOUL.md which lets the skill read and write personal workspace files. The set of requested/implicit accesses (filesystem, network, potential API keys, ability to install packages) is broader than the declared zero-env-vars, which is an incoherence and privacy/credential risk.
!
Persistence & Privilege
always:false (good), and default platform autonomy is allowed. However included files express 'auto_skill_override' and 'skill publisher' / 'auto_solidify_no_ask' behavior (e.g., absolute_silence_v14.json and capability-evolver/publisher code) that would autonomously solidify or publish skills without prompting. The package contains scripts for installing skills, modifying permissions, and self-repair — combined with autonomous invocation this could persist or escalate privileges. The SKILL.md itself recommends proactive background work and writing to workspace files, which grants ongoing presence in the user's filesystem.
What to consider before installing
This package contains an instruction-only SKILL.md that makes sense for a self-improving memory, but the repository also includes hundreds of scripts and automation tools that can install packages, run scrapers, change permissions, modify or publish skills, and read/write user files. Before installing or enabling this skill: 1) Do not run it with autonomous execution turned on; require explicit confirmation for any actions that write files or run scripts. 2) Inspect setup.md and any install_*.sh / install_skills.py / extract-skill.sh before allowing them to run — prefer to run these in an isolated sandbox or ephemeral VM. 3) Do not supply any API keys or credentials unless you audit exactly which component needs them (e.g., ScraperAPI) and why. 4) Search the repo for phrases like "auto_solidify", "auto_skill_override", "install_skills", "install_system_packages.sh", "get-pip.py", and "gui_permission" and review those files carefully — they indicate the skill can change system state and autonomously persist. 5) If you want only the small self-improving memory behavior, ask the author for a minimal variant that only reads/writes a narrow, user-approved directory and removes any installers, scrapers, skill-publisher, or identity tooling. 6) If you proceed, run first in an isolated environment with network disabled (or strictly limited) and no access to your real credentials or important files.
skills/capability-evolver/index.js:214
Shell command execution detected (child_process).
skills/capability-evolver/scripts/build_public.js:170
Shell command execution detected (child_process).
skills/capability-evolver/scripts/generate_history.js:17
Shell command execution detected (child_process).
skills/capability-evolver/scripts/publish_public.js:13
Shell command execution detected (child_process).
skills/capability-evolver/scripts/recover_loop.js:19
Shell command execution detected (child_process).
skills/capability-evolver/scripts/suggest_version.js:27
Shell command execution detected (child_process).
skills/capability-evolver/src/evolve.js:451
Shell command execution detected (child_process).
skills/capability-evolver/src/gep/deviceId.js:51
Shell command execution detected (child_process).
skills/capability-evolver/src/gep/llmReview.js:70
Shell command execution detected (child_process).
skills/capability-evolver/src/gep/solidify.js:67
Shell command execution detected (child_process).
skills/capability-evolver/src/ops/health_check.js:20
Shell command execution detected (child_process).
skills/capability-evolver/src/ops/lifecycle.js:27
Shell command execution detected (child_process).
skills/capability-evolver/src/ops/self_repair.js:17
Shell command execution detected (child_process).
skills/capability-evolver/src/ops/skills_monitor.js:96
Shell command execution detected (child_process).
skills/evolver/index.js:214
Shell command execution detected (child_process).
skills/evolver/scripts/build_public.js:170
Shell command execution detected (child_process).
skills/evolver/scripts/generate_history.js:17
Shell command execution detected (child_process).
skills/evolver/scripts/publish_public.js:13
Shell command execution detected (child_process).
skills/evolver/scripts/recover_loop.js:19
Shell command execution detected (child_process).
skills/evolver/scripts/suggest_version.js:27
Shell command execution detected (child_process).
skills/evolver/src/evolve.js:451
Shell command execution detected (child_process).
skills/evolver/src/gep/deviceId.js:51
Shell command execution detected (child_process).
skills/evolver/src/gep/llmReview.js:70
Shell command execution detected (child_process).
skills/evolver/src/gep/solidify.js:67
Shell command execution detected (child_process).
skills/evolver/src/ops/health_check.js:20
Shell command execution detected (child_process).
skills/evolver/src/ops/lifecycle.js:27
Shell command execution detected (child_process).
skills/evolver/src/ops/self_repair.js:17
Shell command execution detected (child_process).
skills/evolver/src/ops/skills_monitor.js:96
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/exec_cache.js:19
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/index.js:485
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/issue_tracker.js:64
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/lifecycle.js:98
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/report.js:131
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/self-repair.js:20
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/skills_monitor.js:65
Shell command execution detected (child_process).
skills/feishu-evolver-wrapper/index.js:1230
Dynamic code execution detected.
skills/capability-evolver/index.js:129
Environment variable access combined with network send.
skills/capability-evolver/scripts/publish_public.js:248
Environment variable access combined with network send.
skills/capability-evolver/src/evolve.js:58
Environment variable access combined with network send.
skills/capability-evolver/src/gep/a2aProtocol.js:75
Environment variable access combined with network send.
skills/capability-evolver/src/gep/hubReview.js:104
Environment variable access combined with network send.
skills/capability-evolver/src/gep/hubSearch.js:73
Environment variable access combined with network send.
skills/capability-evolver/src/gep/issueReporter.js:21
Environment variable access combined with network send.
skills/capability-evolver/src/gep/memoryGraphAdapter.js:77
Environment variable access combined with network send.
skills/capability-evolver/src/gep/skillDistiller.js:9
Environment variable access combined with network send.
skills/capability-evolver/src/gep/taskReceiver.js:11
Environment variable access combined with network send.
skills/capability-evolver/src/ops/self_repair.js:45
Environment variable access combined with network send.
skills/capability-evolver/test/a2aProtocol.test.js:148
Environment variable access combined with network send.
skills/evolver/index.js:129
Environment variable access combined with network send.
skills/evolver/scripts/publish_public.js:248
Environment variable access combined with network send.
skills/evolver/src/evolve.js:58
Environment variable access combined with network send.
skills/evolver/src/gep/a2aProtocol.js:75
Environment variable access combined with network send.
skills/evolver/src/gep/hubReview.js:104
Environment variable access combined with network send.
skills/evolver/src/gep/hubSearch.js:73
Environment variable access combined with network send.
skills/evolver/src/gep/issueReporter.js:21
Environment variable access combined with network send.
skills/evolver/src/gep/memoryGraphAdapter.js:77
Environment variable access combined with network send.
skills/evolver/src/gep/skillDistiller.js:9
Environment variable access combined with network send.
skills/evolver/src/gep/taskReceiver.js:11
Environment variable access combined with network send.
skills/evolver/src/ops/self_repair.js:45
Environment variable access combined with network send.
skills/evolver/test/a2aProtocol.test.js:148
Environment variable access combined with network send.
skills/feishu-evolver-wrapper/export_history.js:15
Environment variable access combined with network send.
skills/feishu-evolver-wrapper/visualize_dashboard.js:21
Environment variable access combined with network send.
!
skills/capability-evolver/index.js:19
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/scripts/publish_public.js:254
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/src/evolve.js:541
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/src/gep/a2aProtocol.js:41
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/src/gep/hubReview.js:24
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/src/gep/issueReporter.js:42
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/src/gep/questionGenerator.js:20
File read combined with network send (possible exfiltration).
!
skills/capability-evolver/src/gep/skillDistiller.js:22
File read combined with network send (possible exfiltration).
!
skills/evolver/index.js:19
File read combined with network send (possible exfiltration).
!
skills/evolver/scripts/publish_public.js:254
File read combined with network send (possible exfiltration).
!
skills/evolver/src/evolve.js:541
File read combined with network send (possible exfiltration).
!
skills/evolver/src/gep/a2aProtocol.js:41
File read combined with network send (possible exfiltration).
!
skills/evolver/src/gep/hubReview.js:24
File read combined with network send (possible exfiltration).
!
skills/evolver/src/gep/issueReporter.js:42
File read combined with network send (possible exfiltration).
!
skills/evolver/src/gep/questionGenerator.js:20
File read combined with network send (possible exfiltration).
!
skills/evolver/src/gep/skillDistiller.js:22
File read combined with network send (possible exfiltration).
!
skills/feishu-evolver-wrapper/export_history.js:23
File read combined with network send (possible exfiltration).
!
skills/feishu-evolver-wrapper/visualize_dashboard.js:143
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk972cvdt0mfnk9py7phgexev25836085

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧠 Clawdis
OSLinux · macOS · Windows

Comments