Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Mobayilo Voice (Beta)

v0.2.0-beta.1

Place outbound phone calls via Mobayilo with safe defaults (preview mode by default) and explicit live execution.

0· 348·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name and description (outbound calls via Mobayilo) align with the implementation: the code calls the 'moby' CLI, validates destinations, enforces host/approval guardrails, masks phone numbers, emits telemetry, and exposes check_status/start_call entrypoints. Required binary 'moby' and MOBY_HOST env are consistent with purpose.
Instruction Scope
SKILL.md instructs the agent to run the provided check_status and start_call scripts (dry-run by default). The adapter also reads a local config (config/defaults.yaml or MOBY_CONFIG), writes event/telemetry JSONL files, and queries a local agent HTTP endpoint (http://127.0.0.1:7788/) to monitor call progress. Those behaviors are plausible for a desktop-integrated calling adapter but widen the skill's operational scope beyond a simple remote API call — in particular, local HTTP access, filesystem writes, and optional opening of a browser/tab (macOS only) are performed.
Install Mechanism
There is no install spec in the registry (instruction-only skill) so nothing will be auto-downloaded during install. However the runbook/README suggests installing the moby CLI via a remote install script (curl -fsSL https://mobycli.mobayilo.com/install.sh | sh) or building from source; the documented curl|sh pattern is a high-risk operation if performed blindly and should be audited before running.
!
Credentials
Registry metadata lists only MOBY_HOST as a required env var, but the code also reads and relies on several other environment variables (MOBY_CONFIG, MOBY_CLI_PATH, MOBY_ALLOW_NON_PROD_HOST, MOBY_REQUIRE_APPROVAL, and optional MOBY_TWILIO_SDK_PATH). Some are optional guardrails, but the declared env list is incomplete and could surprise an operator. The skill does not request cloud credentials or unrelated secrets, and no primary credential is declared.
Persistence & Privilege
The skill does not request 'always: true' and will not auto-enable itself globally. It writes logs and telemetry to local paths (configurable) and may create files; this is expected for an adapter that records events. It does not modify other skills' configs.
Assessment
This skill appears to be what it claims: a guarded wrapper around the Mobayilo 'moby' CLI that defaults to dry-run. Before installing or running it, check the following: - Confirm you trust the moby CLI binary and its install method. The repo's runbook suggests running a remote installer via curl | sh (https://mobycli.mobayilo.com/install.sh). Audit that script or prefer an OS package/build-from-source path instead. - Be aware the adapter reads config/defaults.yaml (or the path set by MOBY_CONFIG) and will use MOBY_CLI_PATH if present. Review the config file for CLI path, host, and log locations. - The code honors MOBY_ALLOW_NON_PROD_HOST and MOBY_REQUIRE_APPROVAL. If you do not want non-prod hosts or automated live calls, keep MOBY_ALLOW_NON_PROD_HOST unset and keep the approval gate enabled or avoid passing --execute/--approved in automated workflows. - The adapter queries a local agent HTTP endpoint (127.0.0.1:7788) and may open a macOS browser tab. If you run in a restricted environment, ensure that local agent endpoint is acceptable. - The skill writes logs/telemetry JSONL to local files (masked phone numbers by default). Confirm log paths are acceptable and that sensitive data handling meets your policies. - Because registry metadata only lists MOBY_HOST but the code reads additional env vars, inspect and set MOBY_CONFIG, MOBY_CLI_PATH, MOBY_ALLOW_NON_PROD_HOST, and MOBY_REQUIRE_APPROVAL explicitly as needed. If these behaviors are acceptable and you validate the moby CLI source, this skill is coherent with its stated purpose. If any of the above is unexpected, review the source and run the scripts in a sandbox before enabling in production.

Like a lobster shell, security has layers — review code before you run it.

agentvk979v6q4fr8b5wjm2k93deekjh822dmcautomationvk979v6q4fr8b5wjm2k93deekjh822dmclatestvk979v6q4fr8b5wjm2k93deekjh822dmcmobayilovk979v6q4fr8b5wjm2k93deekjh822dmcopenclawvk979v6q4fr8b5wjm2k93deekjh822dmctelephonyvk979v6q4fr8b5wjm2k93deekjh822dmctwiliovk979v6q4fr8b5wjm2k93deekjh822dmcvoicevk979v6q4fr8b5wjm2k93deekjh822dmcworkflowvk979v6q4fr8b5wjm2k93deekjh822dmc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📞 Clawdis
Binsmoby
EnvMOBY_HOST

Comments