Cron Job Guardian

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: cron-job-guardian Version: 1.0.0 The 'cron-job-guardian' skill bundle is a legitimate security auditing tool designed to perform static analysis on cron configurations and scripts. The primary logic in `scripts/run.py` includes a pattern scanner that identifies high-risk commands (e.g., `curl|bash`, `rm -rf /`) and potential secrets, but it masks sensitive data and does not execute the discovered strings. The instructions in `SKILL.md` explicitly enforce safety boundaries, such as avoiding direct system changes and focusing on dry-run reports, aligning perfectly with the stated purpose.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The helper may inspect local files supplied as input and create a local report file.

Why it was flagged

The skill documents an optional local Python helper invocation. This is expected for its stated audit purpose and is not hidden, but it means the agent may run local code if the environment allows it.

Skill content
如运行环境允许 shell / exec,可使用:`python3 "{baseDir}/scripts/run.py" --input <输入文件> --output <输出文件>`
Recommendation

Run it only on intended cron files or script directories, and choose an output path you are comfortable writing to.

What this means

If the scanned input contains secrets or private operational details, the generated report may contain filenames and partial/redacted snippets from those files.

Why it was flagged

The script scans user-supplied text files for secret-like patterns and includes redacted snippets in the generated report. This is purpose-aligned auditing behavior, but report contents can still reflect sensitive local file material.

Skill content
"secret_like": r"(api[_-]?key|token|secret|password)\s*[:=]..." ... findings.append((str(target), name, snippet[:160]))
Recommendation

Avoid scanning unrelated private directories, sanitize sensitive inputs when possible, and review generated reports before sharing them.