agent-pack-n-go
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This skill is coherent for device migration, but it performs a very broad clone of credentials, SSH keys, memory, approvals, cron jobs, and remote system setup, so users should review it carefully before use.
Install this only if you intentionally want a full clone to a trusted device. Review the scripts and generated migration bundle first, avoid permission-skipping modes where possible, inspect copied SSH keys, tokens, skills, memory, cron jobs, and approvals, remove temporary passwordless sudo, and delete migration archives after the clone is verified.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The migration bundle can contain API keys, OAuth/session material, bot tokens, private SSH keys, memories, and prior execution approvals; anyone who obtains the bundle or target account may inherit those privileges.
The pack script copies Claude configuration, SSH keys, OpenClaw credentials, memory, skills, and execution approvals into a migration tarball.
cp -r ~/.claude/. "$TMP_DIR/claude-config/" ... cp -r ~/.ssh/. "$TMP_DIR/ssh-keys/" ... for item in openclaw.json credentials skills extensions memory feishu ... CLAUDE.md exec-approvals.json
Use only with a fully trusted target device and SSH account. Prefer dedicated migration credentials, exclude unnecessary SSH keys if possible, delete migration archives from both devices after completion, and rotate secrets if the target or transfer path may be compromised.
If left in place, any process running as that user on the new device can gain full root privileges without a password.
The skill recommends granting the target user passwordless sudo for all commands during migration.
ssh USER@NEW_IP 'echo "USERNAME ALL=(ALL) NOPASSWD:ALL" | sudo tee /etc/sudoers.d/migration'
Only grant this temporarily if absolutely needed, use the narrowest sudo rule possible, and remove `/etc/sudoers.d/migration` immediately after verifying the migration.
Skipping permission prompts can allow large filesystem, package, service, and configuration changes to proceed without normal review gates.
The manual migration guide instructs running Claude Code with permission checks skipped while executing broad installation, restore, and system-configuration steps.
claude --dangerously-skip-permissions "Follow ~/migration-instructions.md to complete the OpenClaw migration"
Avoid `--dangerously-skip-permissions` unless operating in a disposable, trusted environment. Prefer running the provided scripts step-by-step with explicit review of commands and outputs.
Any stale, poisoned, overly permissive, or sensitive agent state from the old device will be carried to the new device and reused by the cloned agent.
The migration copies persistent memory, workspaces, skills, agent instruction files, and execution approvals to the new device.
for item in openclaw.json credentials skills extensions memory feishu workspace workspace-coder workspace-paper-tracker CLAUDE.md exec-approvals.json; do ... cp -r "$src"
Before deploying, review copied skills, memory, CLAUDE.md, workspace files, and exec-approvals.json; remove stale approvals or untrusted instructions before starting the cloned agent.
Incorrect or malicious old-device host entries or cron jobs can be propagated to the new device and affect networking or run recurring commands without separate review.
The deploy script automatically restores host-file entries and scheduled cron jobs from the migration bundle.
echo "$line" | sudo tee -a /etc/hosts > /dev/null ... crontab "$MIGRATION_TMP/crontab-backup.txt"
Inspect `hosts-custom.txt` and `crontab-backup.txt` before restoration, and remove any entries that are outdated, unnecessary, or not understood.
The cloned agent may keep running in the background on the new device until explicitly stopped or disabled.
The deployment enables the cloned OpenClaw gateway to persist as a user service and continue after SSH logout.
systemctl --user enable openclaw-gateway ... systemctl --user start openclaw-gateway ... sudo loginctl enable-linger $USER
After migration, verify service status and disable or stop `openclaw-gateway` if you do not want the cloned agent to remain active.
The exact installed code may change over time based on the npm registry state, which can affect reproducibility and supply-chain assurance.
The deployment installs external global npm packages without version pinning.
npm install -g openclaw mcporter > /tmp/npm-install.log 2>&1
Pin package versions or verify package provenance before running the deployment on a sensitive machine.
