Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ralph Loop (Agent Mode)

Guide OpenClaw agents to execute Ralph Wiggum loops using exec and process tools. Agent orchestrates coding agents (Codex, Claude Code, OpenCode, Goose) with proper TTY support via pty:true. Plans/builds code via PROMPT.md + AGENTS.md, SPECS and IMPLEMENTATION_PLAN.md. Includes PLANNING vs BUILDING modes, backpressure, sandboxing, and completion conditions. Users request loops, agents execute using tools.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 2.1k · 11 current installs · 11 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's README and package.json clearly describe launching interactive coding CLIs (opencode, codex, claude, goose, pi) and requiring exec/process/file-read/file-write permissions — which fits the stated purpose. However the registry metadata shown to you earlier lists no required binaries or env vars, which contradicts the package.json and SKILL.md. That mismatch (no declared required CLIs in the registry view vs. explicit tool requirements in the files) should be resolved before trusting the skill.
!
Instruction Scope
The SKILL.md instructs agents to construct and exec arbitrary CLI command strings built from PROMPT.md and project files and to run background interactive sessions with pty:true. This is functionally coherent for an orchestrator, but the instructions also promote using auto-approval flags (e.g. --yolo, --dangerously-skip-permissions) and running arbitrary tests/commits. Those bits broaden the agent's runtime discretion and enable bypassing sandbox/permission checks — a real risk if misused or combined with malicious prompts or untrusted repos.
Install Mechanism
This is instruction-only (no install spec and no code files to execute on install), which is the lowest install risk. Nothing in the bundle downloads or writes code at install time.
Credentials
The skill doesn't request environment variables or credentials from the registry metadata, and package.json lists only tool and permission requirements (exec/process/file-read/file-write), which are consistent with running CLIs and manipulating project files. However the skill will read and write workspace files (PROMPT.md, AGENTS.md, IMPLEMENTATION_PLAN.md, project files) and will execute arbitrary CLI commands which can access network services or local credentials. The absence of declared required credentials is not an assurance that sensitive data won't be accessed during runs — the agent's runtime commands could touch cloud CLIs or git remotes.
Persistence & Privilege
always:false and no install-time persistence are set; the skill is user-invocable and relies on agent tools at runtime. It does not request force-inclusion or system-wide configuration changes in the provided materials.
What to consider before installing
This skill appears to do what it says — it teaches an OpenClaw agent how to launch and monitor interactive coding CLIs using exec + process — but there are several things to consider before installing or running it: 1. Metadata mismatch: The package/README explicitly require CLIs like opencode/codex/claude/goose, but the registry metadata you were shown said 'none' for required binaries. Confirm which CLIs are actually required and present on the host before use. 2. Review auto-approval flags: The SKILL.md references risky flags (e.g. --yolo, --dangerously-skip-permissions, --full-auto). Avoid enabling those unless you run the skill in a fully isolated sandbox and understand the consequences. 3. Sandbox and least privilege: Run initial tests in an isolated environment (container/VM) with limited network and credentials. Prefer sandboxed execution (docker/e2b/fly) as the README recommends. 4. Inspect generated prompts and files: The agent will create and cat PROMPT.md and other files into CLI commands. Prompt injection or crafted prompts could cause the coding CLI to run unintended actions. Review PROMPT.md, AGENTS.md, and command strings before allowing execution. 5. Monitor runtime and logs: Use the platform's process/exec monitoring controls and be prepared to kill sessions if behavior is unexpected. Do not give the agent access to sensitive cloud credentials or wide git permissions when testing. 6. What would change this assessment: If there were an install script that downloaded code from an untrusted host, or the skill requested unrelated credentials (AWS/GCP tokens) in its declared requirements, or the registry metadata intentionally omitted required exec/process permissions — the verdict would be higher-severity suspicious or worse. Providing explicit, consistent required-tools metadata and removing or clearly warning about permission-bypassing flags would increase my confidence to 'benign'.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.1.0
Download zip
latestvk9791380adwhbksfkd4sazetad80mrcx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Ralph Loop

Overview

This skill guides OpenClaw agents to execute Ralph Loop workflows using the exec and process tools. The agent orchestrates AI coding agent sessions following the Ralph playbook flow:

  1. Define Requirements → JTBD → Focus Topics → specs/*.md
  2. PLANNING Loop → Create/update IMPLEMENTATION_PLAN.md (do not implement)
  3. BUILDING Loop → Implement tasks, run tests (backpressure), update plan, commit

The loop persists context via PROMPT.md + AGENTS.md (loaded each iteration) and the plan/specs on disk.

How This Skill Works

This skill generates instructions for OpenClaw agents to execute Ralph Loops using the exec and process tools.

  • The agent calls exec tool with the coding agent command
  • Uses pty: true to provide TTY for interactive CLIs
  • Uses background: true for monitoring capabilities
  • Uses process tool to monitor progress and detect completion

Important: Users don't run these scripts directly - the OpenClaw agent executes them using its tool capabilities.


TTY Requirements

Some coding agents require a real terminal (TTY) to work properly, or they will hang:

Interactive CLIs (need TTY):

  • OpenCode, Codex, Claude Code, Pi, Goose

Non-interactive CLIs (file-based):

  • aider, custom scripts

Solution: Use exec + process mode for interactive CLIs, simple loops for file-based tools.


Agent Tool Usage Patterns

Interactive CLIs (Recommended Pattern)

For OpenCode, Codex, Claude Code, Pi, and Goose - these require TTY support:

When I (the agent) receive a Ralph Loop request, I will:

  1. Use exec tool to launch the coding agent:

    exec tool with parameters:
    - command: "opencode run --model <MODEL> \"$(cat PROMPT.md)\""
    - workdir: <project_path>
    - background: true
    - pty: true
    - yieldMs: 60000
    - timeout: 3600
    
  2. Capture session ID from exec tool response

  3. Use process tool to monitor:

    process tool with:
    - action: "poll"
    - sessionId: <captured_session_id>
    
    process tool with:
    - action: "log"
    - sessionId: <captured_session_id>
    - offset: -30  (for recent output)
    
  4. Check completion by reading IMPLEMENTATION_PLAN.md for sentinel text

  5. Clean up with process kill if needed:

    process tool with:
    - action: "kill"
    - sessionId: <session_id>
    

Benefits: TTY support, real-time logs, timeout handling, parallel sessions, workdir isolation


Agent Workflow

1) Gather Inputs

Required:

  • Goal / JTBD
  • CLI (opencode, codex, claude, goose, pi, other)
  • Mode (PLANNING, BUILDING, or BOTH)
  • Max iterations (default: PLANNING=5, BUILDING=10)

Optional:

  • Completion sentinel (default: STATUS: COMPLETE in IMPLEMENTATION_PLAN.md)
  • Working directory (default: $PWD)
  • Timeout per iteration (default: 3600s)
  • Sandbox choice
  • Auto-approval flags (--full-auto, --yolo, --dangerously-skip-permissions)

Auto-detect:

  • If CLI in interactive list → use exec tool with pty: true
  • Extract model flag from CLI requirements

2) Requirements → Specs (Optional)

If requirements are unclear:

  • Break JTBD into focus topics
  • Draft specs/<topic>.md for each
  • Keep specs short and testable

3) PROMPT.md + AGENTS.md

PROMPT.md references:

  • specs/*.md
  • IMPLEMENTATION_PLAN.md
  • Relevant project files

AGENTS.md includes:

  • Test commands (backpressure)
  • Build/run instructions
  • Operational learnings

4) Prompt Templates

PLANNING Prompt (no implementation):

You are running a Ralph PLANNING loop for this goal: <goal>.

Read specs/* and the current codebase. Only update IMPLEMENTATION_PLAN.md.

Rules:
- Do not implement
- Do not commit
- Create a prioritized task list
- Write down questions if unclear

Completion:
When plan is ready, add: STATUS: PLANNING_COMPLETE

BUILDING Prompt:

You are running a Ralph BUILDING loop for this goal: <goal>.

Context: specs/*, IMPLEMENTATION_PLAN.md, AGENTS.md

Tasks:
1) Pick the most important task
2) Investigate code
3) Implement
4) Run backpressure commands from AGENTS.md
5) Update IMPLEMENTATION_PLAN.md
6) Update AGENTS.md with learnings
7) Commit with clear message

Completion:
When all done, add: STATUS: COMPLETE

5) CLI Command Reference

The agent constructs command strings using these patterns:

CLICommand String Pattern
OpenCodeopencode run --model <MODEL> "$(cat PROMPT.md)"
Codexcodex exec <FLAGS> "$(cat PROMPT.md)" (requires git)
Claude Codeclaude <FLAGS> "$(cat PROMPT.md)"
Pipi --provider <PROVIDER> --model <MODEL> -p "$(cat PROMPT.md)"
Goosegoose run "$(cat PROMPT.md)"

Common flags:

  • Codex: --full-auto, --yolo, --model <model>
  • Claude: --dangerously-skip-permissions

Detailed Agent Tool Usage Examples

Example 1: OpenCode Ralph Loop

Agent executes this sequence:

Step 1: Launch OpenCode with exec tool
{
  command: "opencode run --model github-copilot/claude-opus-4.5 \"$(cat PROMPT.md)\"",
  workdir: "/path/to/project",
  background: true,
  pty: true,
  timeout: 3600,
  yieldMs: 60000
}

Step 2: Capture session ID from response
sessionId: "abc123"

Step 3: Monitor with process tool every 10-30 seconds
{
  action: "poll",
  sessionId: "abc123"
}

Step 4: Check recent logs
{
  action: "log",
  sessionId: "abc123",
  offset: -30
}

Step 5: Read IMPLEMENTATION_PLAN.md to check for completion
- Look for: "STATUS: COMPLETE" or "STATUS: PLANNING_COMPLETE"

Step 6: If complete or timeout, cleanup
{
  action: "kill",
  sessionId: "abc123"
}

Example 2: Codex with Full Auto

Agent tool calls:

exec tool:
{
  command: "codex exec --full-auto --model anthropic/claude-opus-4 \"$(cat PROMPT.md)\"",
  workdir: "/path/to/project",
  background: true,
  pty: true,
  timeout: 3600
}

# Then monitor with process tool as above

Completion Detection

Use flexible regex to match variations:

grep -Eq "STATUS:?\s*(PLANNING_)?COMPLETE" IMPLEMENTATION_PLAN.md

Matches:

  • STATUS: COMPLETE
  • STATUS:COMPLETE
  • STATUS: PLANNING_COMPLETE
  • ## Status: PLANNING_COMPLETE

Safety & Safeguards

Auto-Approval Flags (Risky!)

  • Codex: --full-auto (sandboxed, auto-approve) or --yolo (no sandbox!)
  • Claude: --dangerously-skip-permissions
  • Recommendation: Use sandboxes (docker/e2b/fly) and limited credentials

Escape Hatches

  • Stop: Ctrl+C
  • Kill session: process tool with action: "kill"
  • Rollback: git reset --hard HEAD~N

Best Practices

  1. Start small: Test with 1-2 iterations first
  2. Workdir isolation: Prevent reading unrelated files
  3. Set timeouts: Default 1h may not fit all tasks
  4. Monitor actively: Check logs, don't terminate prematurely
  5. Requirements first: Clear specs before building
  6. Backpressure early: Add tests from the start

Troubleshooting

ProblemSolution
OpenCode hangsEnsure agent uses exec tool with pty: true
Session won't startCheck CLI path, git repo, command syntax
Completion not detectedVerify sentinel format in IMPLEMENTATION_PLAN.md
Process timeoutAgent should increase timeout parameter or simplify tasks
Parallel conflictsAgent should use git worktrees for isolation
Can't see progressAgent should use process tool with action: "log"

License

MIT

Credits

This skill builds upon work by:

  • @jordyvandomselaar - Original Ralph Loop concept and workflow design
  • @steipete - Coding agent patterns and exec/process tool usage with pty support

Key improvement: Uses OpenClaw's exec tool with pty: true to provide TTY for interactive CLIs, solving the hanging issue that occurs with simple background bash execution.

Files

4 total
Select a file
Select a file to preview.

Comments

Loading comments…