Aegean Cron Mastery

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The instructions match a cron/reminder purpose, but the skill instructs file deletions, persistent memory writes, and includes hard-coded delivery targets while declaring no required config/credentials — these mismatches merit caution.

This skill appears to implement legitimate cron/scheduler guidance, but it contains several red flags: (1) it instructs deleting a local state file (~/.openclaw/state/cron/jobs.json) and writing to MEMORY.md — back up those files and require explicit confirmation before performing deletions/writes; (2) templates include hard-coded Telegram recipient IDs (e.g., 1027899060) and instruct sending proactive messages — verify how your platform's Telegram connector is configured and avoid using or keeping hard-coded external recipients; (3) the skill expects 'main' session privileges to remove jobs and perform maintenance, so restrict who/what can schedule janitor jobs and review any jobs before enabling autonomous execution; (4) the registry metadata declares no required config paths or credentials despite the instructions needing filesystem and messaging access — ask the author to explicitly list required permissions, config paths, and connectors; (5) the differing ownerId in _meta.json vs registry metadata is odd — request clarification or a clean packaging. Recommended actions before installing: review and sanitize example templates (remove hard-coded IDs), require an explicit allow-list for any cron jobs that can delete files or send messages, and test any troubleshooting steps (like file deletion) in a safe environment or with backups. If you need higher assurance, ask the publisher for a clarified manifest that declares required config paths and connector credentials and/or request a version that does not suggest destructive filesystem commands.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

No VirusTotal findings

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.