Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
AceToolz UUID Generator
v1.0.1Generate UUIDs (v1, v4, v7) in bulk using AceToolz.
⭐ 0· 43·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description match the runtime instructions: the skill's sole capability is to request UUIDs from acetoolz.com. While generating UUIDs locally would also be possible, using an external API is a coherent design choice and not disproportionate.
Instruction Scope
SKILL.md instructs only to make POST requests to https://www.acetoolz.com/api/openclaw/uuid-generator and to validate parameters (version, count). It does not request access to files, environment variables, or unrelated services. Note: calling the external API will reveal the agent's network-level metadata (IP, user-agent) to AceToolz.
Install Mechanism
No install spec or code files are present (instruction-only). Nothing is downloaded or written to disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. There are no disproportionate secret or config requirements.
Persistence & Privilege
The skill is not always-on and does not request elevated persistence or modify other skills or system settings. Autonomous invocation is allowed (platform default) but not accompanied by other risky privileges.
Assessment
This skill appears to do what it claims: it calls AceToolz’s UUID API and returns results. Consider privacy and availability tradeoffs before installing: each API call goes over the network to an external service (your IP and request metadata may be logged by AceToolz), and for v1 UUIDs the generator may include timestamp/MAC-derived semantics. If you need offline or privacy-preserving generation, generate UUIDs locally instead (most platforms/languages can produce v4/v1/v7 UUIDs without an external call). If you proceed, verify the HTTPS endpoint and review AceToolz’s privacy policy if leakage of request metadata is a concern.Like a lobster shell, security has layers — review code before you run it.
acetoolzvk9759q2dn7sjj2mrzn68qba429846dmwdeveloper-toolsvk9759q2dn7sjj2mrzn68qba429846dmwguidvk9759q2dn7sjj2mrzn68qba429846dmwlatestvk9759q2dn7sjj2mrzn68qba429846dmwrandomvk9759q2dn7sjj2mrzn68qba429846dmwunique-idvk9759q2dn7sjj2mrzn68qba429846dmwuuidvk9759q2dn7sjj2mrzn68qba429846dmw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🆔 Clawdis
