Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ssl Watcher

v1.4.0

Monitors SSL certificates and domain expirations, providing alerts for upcoming expiry, misconfigurations, and chain issues on multiple domains.

0· 65·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for snipercat69/edgeiq-ssl-watcher.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Ssl Watcher" (snipercat69/edgeiq-ssl-watcher) from ClawHub.
Skill page: https://clawhub.ai/snipercat69/edgeiq-ssl-watcher
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install edgeiq-ssl-watcher

ClawHub CLI

Package manager switcher

npx clawhub@latest install edgeiq-ssl-watcher
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The Python code (ssl_watcher.py) implements SSL certificate checks, banner grabs, and HTTP header inspection, which matches the skill's stated purpose. However, the included edgeiq_licensing.py adds payment/license-related behavior and hardcoded support paths that are unrelated to core scanning functionality (licensing is plausible for a paid tool but is not declared in the SKILL.md requirements).
!
Instruction Scope
SKILL.md claims 'pure stdlib + socket' and presents local CLI usage (ok), but it omits that the code will read files in the user's home directory (~/.edgeiq/*) and inspect environment variables. The README also mentions WHOIS and Discord commands but the distributed files show no declared Discord integration and the WHOIS implementation is not visible in the truncated file—you should confirm the full script implements WHOIS as claimed. The instructions do not disclose the licensing checks or env vars the code inspects.
Install Mechanism
There is no automated installer; SKILL.md shows a manual copy operation. No remote downloads or package installs are present in the provided files. This is low-risk from an install-mechanism perspective.
!
Credentials
The registry metadata says 'required env vars: none', but edgeiq_licensing.py reads EDGEIQ_LICENSE_KEY and EDGEIQ_EMAIL from the environment and also reads license files from ~/.edgeiq. That is an inconsistency. Additionally, the licensing file grants bundle access if EDGEIQ_EMAIL equals a specific hardcoded email (gpalmieri21@gmail.com), which looks like a privileged backdoor and is not documented in SKILL.md.
Persistence & Privilege
The skill does not request always:true and does not appear to alter other skills or system-wide settings. It does read/writes (read-only in provided code) to a ~/.edgeiq directory which is a user-home path outside the skill folder; this is a modest privilege but not an escalatory one. No evidence of self-enabling or scheduled persistent agents in the provided files.
What to consider before installing
This skill's core functionality (checking certs and headers) appears coherent, but review these issues before installing: 1) The code reads ~/.edgeiq/* and environment variables (EDGEIQ_LICENSE_KEY, EDGEIQ_EMAIL) even though the package metadata declares no required env vars—don't set those env vars unless you understand the implications. 2) edgeiq_licensing.py contains a hardcoded email that is treated as a license shortcut (gpalmieri21@gmail.com); treat that as a backdoor-like behavior and request clarification from the author. 3) There is no automated installer or remote download, so run the tool in a sandbox or container first and inspect the full ssl_watcher.py (the snippet was truncated) to confirm there is no hidden network exfiltration or unexpected endpoints. 4) If you plan to use WHOIS or Discord/automation features, verify the code implements them and that any credentials/hooks are explicitly documented. If you cannot verify the author/source, consider running the script with network blocked or use an isolated VM. Providing the full ssl_watcher.py (untruncated) or asking the author to explain the licensing behavior would increase confidence.

Like a lobster shell, security has layers — review code before you run it.

latestvk97egqrj57tp4c38mwen9t0pex85h3mp
65downloads
0stars
3versions
Updated 3d ago
v1.4.0
MIT-0

SSL & Domain Expiry Watcher

Skill Name: ssl-watcher
Version: 1.1.0
Category: Security / Monitoring
Price: Lifetime: $25 / Optional Monthly: $5/mo (all Pro features permanently)
Author: EdgeIQ Labs
OpenClaw Compatible: Yes — Python 3, pure stdlib + socket, WSL + Windows


What It Does

Monitors SSL certificate health and domain expiry dates for your web properties. Catch expired certs, misconfigured chains, and domains about to lapse before they become emergencies.

⚠️ Legal Notice: Only monitor domains you own or have explicit written permission to audit. Unauthorized recon is illegal.


Features

  • SSL Certificate Check — issuer, validity window, chain completeness, protocol versions, cipher strength
  • Domain Expiry Check — WHOIS registration and expiration data via socket lookup
  • Days-to-Expiry Alerting — configurable warning thresholds (30/14/7/3 days)
  • Batch Monitoring — check multiple domains in one run
  • Silent Mode — full report, no stdout noise unless issues found
  • Pure Python — no external dependencies beyond stdlib + socket

Installation

cp -r /home/guy/.openclaw/workspace/apps/ssl-watcher ~/.openclaw/skills/ssl-watcher

Usage

Check SSL for a Domain

python3 ssl_watcher.py --domain example.com

Check Multiple Domains

python3 ssl_watcher.py --domains example.com store.example.com api.example.com

With Expiry Threshold Alerts

python3 ssl_watcher.py --domain example.com --warn-days 30

Full Report (all details)

python3 ssl_watcher.py --domain example.com --verbose

As OpenClaw Discord Command

In #edgeiq-support channel:

!ssl example.com
!ssl example.com store.example.com api.example.com
!ssl example.com --warn-days 14
!domain example.com

Parameters

FlagTypeDefaultDescription
--domainstringSingle domain to check
--domainslistMultiple domains to check (space-separated)
--warn-daysint30Alert if cert/domain expires within this many days
--verboseflagFalseShow full chain and protocol details
--check-httpflagFalseAlso verify site is reachable over HTTPS
--outputstringWrite JSON report to file

Output Example

=== SSL Watcher Report ===
example.com
  Status:      ✔ Valid
  Issuer:       Let's Encrypt
  Valid From:  2026-01-15
  Expires:     2026-04-15
  Days Left:   23  ⚠ WARN
  Chain:       complete
  Protocols:   TLS 1.2, TLS 1.3

store.example.com
  Status:      ✔ Valid
  Issuer:      GlobalSign
  Expires:     2026-07-20
  Days Left:   120

Tier Comparison

FeatureFreePro ($9/mo)Bundle ($39/mo)
Single domain check
Multiple domains✅ (up to 10)✅ (unlimited)
WHOIS expiry data
Expiry warning thresholds
JSON report export
Weekly automated scan
Email alert on expiry

Pricing

FeatureLifetime ($25)Optional Monthly ($5/mo)
Single domain check
Multiple domains✅ (unlimited)✅ (unlimited)
WHOIS expiry data
Expiry warning thresholds
JSON report export
Weekly automated scan
Email alert on expiry

Lifetime License: $25 — your tool forever, all features included permanently.

Optional Monthly: $5/mo — for those who prefer recurring billing (cancel anytime). 👉 Buy Lifetime — $25 👉 Subscribe Monthly — $5/mo 👉 Subscribe Monthly — $5/mo

Pro Upgrade (deprecated)

All features now included in Lifetime purchase.

Bundle Deal (deprecated)

All features now included in Lifetime purchase.


Support

Need a custom check or bulk monitoring? Open a ticket in #edgeiq-support or email gpalmieri21@gmail.com.


🔗 More from EdgeIQ Labs

edgeiqlabs.com — Security tools, OSINT utilities, and micro-SaaS products for developers and security professionals.

  • 🛠️ Subdomain Hunter — Passive subdomain enumeration via Certificate Transparency
  • 📸 Screenshot API — URL-to-screenshot API for developers
  • 🔔 uptime.check — URL uptime monitoring with alerts
  • 🛡️ headers.check — HTTP security headers analyzer

👉 Visit edgeiqlabs.com →

Comments

Loading comments...