Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
skill-tracker
v1.0.0Track skill execution details including matched skills, decomposed tasks, execution status, outputs, and timestamps. Called at the start of every conversatio...
⭐ 0· 293·5 current·5 all-time
by@abo-hub
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (tracking skill execution) aligns with requiring a local append-only JSONL tracking file and reading/writing that file. No unrelated env vars or external services are requested, which is coherent for a local tracker.
Instruction Scope
Instructions require capturing full user messages, assistant replies, matched skills, task outputs, and artifact absolute paths for every conversation turn. That reasonably falls within 'tracking' but raises privacy risk because it logs conversational content and filesystem paths. Critically, the doc says the file must be "append-only" yet also instructs the agent to "read the file, find the last line ... update task statuses" — this is a direct contradiction (modifying a prior line vs append-only). The update workflow is truncated and unclear about whether updates must be appended as new records or in-place edits are allowed.
Install Mechanism
Instruction-only skill with no install spec and no code files; lowest installation risk (nothing downloaded or executed beyond agent runtime).
Credentials
The skill requests no env vars or external credentials, which is proportionate. However it does require access to the agent's workspace and will record absolute filesystem paths and potentially content produced by other skills — this grants wide visibility into local outputs and could expose sensitive files if artifacts are recorded.
Persistence & Privilege
The skill demands to be called at the start of every conversation turn, giving it broad runtime visibility across all agent interactions (though it's not set always:true). That persistent observation of all turns plus the obligation to write/read a shared file creates a large blast radius for privacy leaks, concurrency issues (racing appends), and potential accidental disclosure if workspace files are accessible to other components.
What to consider before installing
This skill is largely coherent for a local usage-tracker, but consider the following before installing:
- Clarify the file-update semantics: the SKILL.md's "append-only" rule conflicts with later steps that say to "update" the turn record. Ask the author whether updates should be implemented by appending a new record for the same turn (preferred) or by editing an existing line (which violates append-only).
- Privacy: the tracker logs user messages, assistant replies, skill names, outputs, and absolute file paths. Decide whether conversational content should be recorded at all. If you accept it, require redaction rules, field-level minimization (avoid storing full message text unless necessary), and a documented retention/rotation policy.
- Access control & encryption: confirm where workspace/tracker-result lives, who/what can read it, and whether the file is encrypted at rest. Other skills or system components may be able to read workspace files.
- Concurrency & integrity: ask how concurrent turns are handled (atomic appends, locks) to avoid interleaved writes or lost updates. Prefer an append-only design where progress is recorded by appending new status records rather than editing prior lines.
- Scope-limiting: require the skill never to record itself (it states this) and require a whitelist/opt-out for recording particularly sensitive skills/tools.
- Testing & failure modes: confirm behavior if the directory is not writable, disk is full, or the agent crashes mid-turn — ensure failures don't prevent responding to users.
If these questions are not answered satisfactorily, treat the skill as high-risk for privacy exposure and avoid installation or run it only in isolated/test environments.Like a lobster shell, security has layers — review code before you run it.
latestvk972r4xw8eq96hn5d5kvkbzwyd82dvzs
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
