Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Desktop Sandbox

v1.1.1

A desktop sandbox lets OpenClaw run as natively as on a real OS, ensuring full functionality with safe isolation.Run OpenClaw without breaking your PC.

2· 1.2k·3 current·3 all-time
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name and description claim to install a desktop sandbox. The code and SKILL.md implement a downloader/installer that fetches GitHub releases from the specified repo and runs the .pkg on macOS or .exe on Windows. Requiring node is appropriate for the provided Node script.
Instruction Scope
Instructions are narrow and explicit: run node scripts/run_installer.js (optionally with --version). The installer script downloads release assets from GitHub and executes them. This is in-scope for an installer, but the runtime will download arbitrary binaries from the repo's releases and execute them (including installing into system locations), which is a high-impact action that users should consciously approve.
Install Mechanism
There is no packaged install spec; the skill is instruction + embedded Node script. The script uses the GitHub API to find release assets and downloads them directly (via HTTPS) before running installers. Using GitHub releases is a reasonable source, but downloading and executing release assets is moderate risk compared with an instruction-only skill because it writes and executes binaries on the host.
Credentials
The skill only requires the node binary and does not request credentials, environment variables, or config paths. The script does not appear to read unrelated environment variables or sensitive files in the provided portion of the code.
Persistence & Privilege
The skill does not request permanent presence (always:false) and does not modify other skills. However, it attempts to run OS installers that may write to system directories (e.g., Program Files / root), which can trigger elevation prompts or require administrative privileges. That is expected for an installer but increases the potential impact if the upstream installer is untrusted.
Assessment
This skill will download a platform installer from the GitHub releases of AtlasCore-tech/desktop-sandbox-openclaw and execute it on your machine. That behavior matches its stated purpose but has real risk because installers run with system impact. Before using it: (1) verify the upstream GitHub repo and its maintainer are trustworthy, (2) inspect the release assets and checksums on the repo yourself (or ask for signed releases), (3) run the installer in a disposable/test environment first, (4) avoid granting admin privileges unless you trust the binary, and (5) if you need higher assurance, provide the full, untruncated script for code review and confirm there are no hidden network callbacks or telemetry endpoints beyond GitHub releases.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

📦 Clawdis
Binsnode
latestvk9715f3qakf841jwkpb69ygh3s80yrqb
1.2kdownloads
2stars
3versions
Updated 10h ago
v1.1.1
MIT-0

Desktop Sandbox Installer

Install AtlasCore Desktop Sandbox from GitHub releases.

Script

node scripts/run_installer.js [--version=v1.0]

Parameters

ParameterDescription
--versionSpecific version (default: latest)

Platform Behavior

PlatformInstallerTarget
Windows.exe/S /D=C:\Program Files\C:\Program Files\
macOS.pkgopen -W/

Exit Codes

CodeMeaning
0Success
1Installation failed
999Fatal error

OpenClaw Conversation Usage

In conversation, simply say:

  • "Install AtlasCore desktop sandbox"
  • "Install desktop sandbox"
  • "Download and install AtlasCore sandbox"

Comments

Loading comments...