Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
OpenAI Codex Sub Agents
v1.0.0Use OpenAI Codex CLI for coding tasks. Triggers: codex, code review, fix CI, refactor code, implement feature, coding agent, gpt-5-codex. Enables Clawdbot to delegate coding work to Codex CLI as a subagent or direct tool.
⭐ 6· 4.1k·19 current·20 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill claims to let Clawdbot delegate coding to the Codex CLI and all instructions are consistent with that purpose. However, it does not declare any required binaries or config paths even though it repeatedly instructs the agent to run the 'codex' CLI and to read/sync '~/.codex/auth.json'. The omission of a declared required binary (codex) and required config path is an inconsistency.
Instruction Scope
SKILL.md instructs the agent to run codex commands (including --full-auto, sandbox 'danger-full-access', and MCP server modes), to read ~/.codex/auth.json, and to auto-sync tokens into Clawdbot's agent auth profiles. These steps involve reading local credentials, granting filesystem edits, and giving network access — broader scope than a simple 'code helper' and not limited or explicit about when to request user approval.
Install Mechanism
This is an instruction-only skill with no install spec or code files, so nothing is written to disk by the skill itself. That limits direct install risk. However, it instructs installing '@openai/codex' via npm which is a reasonable, traceable package instruction — the skill itself doesn't automate that install.
Credentials
The skill declares no required environment variables but expects and recommends using ChatGPT/OpenAI auth stored in '~/.codex/auth.json' and syncing those tokens into '~/.clawdbot/agents/.../auth-profiles.json'. Recommending automatic copying of OAuth/API tokens without documenting that as a required config path or explaining safeguards is disproportionate and creates a credential-handling risk.
Persistence & Privilege
always:false (normal), but the skill recommends auto-syncing tokens into Clawdbot config and modifying Clawdbot auth profiles. That is effectively modifying other agent configuration and moving credentials between tools — an elevated privilege and a persistent change to other agents' config that should be explicit and consented to.
What to consider before installing
What to consider before installing:
- Source provenance: there's no homepage or source repository. Confirm the skill's origin before trusting it.
- Binary & config mismatch: the skill tells the agent to run the 'codex' CLI and to read ~/.codex/auth.json, but the skill metadata does not declare the codex binary or config paths; expect the agent to require local codex installation and access to your ~/.codex files.
- Credential handling risk: the instructions explicitly recommend syncing Codex OAuth/API tokens into Clawdbot's agent auth profiles. That moves local credentials into another tool's config — only permit this if you trust both the Codex CLI installation and the skill owner.
- Broad runtime privileges: the documentation encourages '--full-auto' and 'danger-full-access' sandboxes which allow file writes and network access. Avoid these options on untrusted repos or without manual approvals.
- Mitigations: ask the publisher for source code or a homepage; install and test codex CLI in an isolated environment (container or VM); inspect ~/.codex/auth.json and Clawdbot auth files before and after onboarding; disable automatic auth-sync and perform token imports manually if you proceed; prefer read-only/sandboxed modes and require explicit approvals for writes or network access.
Given the missing provenance and the implicit credential/config operations, treat this skill as suspicious until you can verify the author and the exact mechanisms by which tokens and configuration are accessed and copied.Like a lobster shell, security has layers — review code before you run it.
latestvk97ad5mrxgeg43pbd7g2vx8crx800bqx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
