Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Dev Machine Cleanup

v1.0.0

开发机清理技能 - 异步清理日志和临时文件(不阻塞主会话)

0· 114·1 current·1 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for alexmayanjun-collab/dev-machine-cleanup.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Dev Machine Cleanup" (alexmayanjun-collab/dev-machine-cleanup) from ClawHub.
Skill page: https://clawhub.ai/alexmayanjun-collab/dev-machine-cleanup
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install dev-machine-cleanup

ClawHub CLI

Package manager switcher

npx clawhub@latest install dev-machine-cleanup
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims to clean a development machine, which fits the commands it lists. However it assumes SSH access to a host named 'datax' and spawning child agents (agent-ge/agent-cc) but declares no required credentials, hostnames, or config paths. Requesting no environment variables or binaries is inconsistent with needing SSH keys/credentials and permission to run docker/image-prune and filesystem deletes.
!
Instruction Scope
The SKILL.md instructs child agents to run destructive shell commands (find ... -delete, docker image prune -f) directly on /mnt/www. There are no safety checks (no dry-run, no explicit whitelists, no confirmation, no pre-delete file listing), and it references specific internal agent IDs and hostnames, granting broad discretion to remove files. This scope is plausible for a cleanup tool but lacks required safeguards and clear boundaries.
Install Mechanism
Instruction-only skill with no install spec or code files. That keeps disk/write risk low; nothing is downloaded or installed by the skill itself.
!
Credentials
The skill does not declare any required credentials but implicitly requires SSH credentials and host access, and privileges to delete files and manage Docker on the target host. This mismatch (no declared env/config requirements vs. needing elevated remote access) is disproportionate and should be clarified.
Persistence & Privilege
The skill is not 'always' enabled and is user-invocable. It spawns child agents and writes a cleanup log into agent memory (memory/dev-cleanup-YYYY-MM-DD.md), which is normal. Autonomous invocation is permitted by default; that alone is not flagged, but combined with the destructive remote operations it increases blast radius.
What to consider before installing
This skill runs destructive cleanup commands on a host called 'datax' via spawned child agents but does not explain how SSH/authentication is provided and has no safety checks. Before installing or enabling it, verify: 1) exactly which host(s) it will access and how (hostname/IP), 2) how SSH authentication/keys are supplied and stored (avoid embedding private keys in agent memory), 3) that the agent account has least privilege and cannot delete business/config files, 4) add a dry-run mode and pre-delete file listing and review step, 5) require explicit user confirmation for deletes above a size/count threshold, 6) ensure backups exist and test in staging first, and 7) prefer explicit whitelists/paths rather than running find -delete broadly. Because the skill comes from an unknown source and performs irreversible actions, treat it as potentially risky until these questions are answered.

Like a lobster shell, security has layers — review code before you run it.

latestvk978a3czqnfr1y2xa43psjtys583mjhe
114downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

🧹 开发机清理技能(异步版)

清理开发机(datax)上的日志文件和临时文件,异步执行不阻塞

🎯 触发词

  • "打扫卫生"
  • "清理开发机"
  • "清理绿地"
  • "让老高去打扫卫生"
  • "让顺子去打扫卫生"
  • "清理日志"
  • "清理临时文件"

🚀 核心特性

异步执行:

  • ✅ 不阻塞主会话
  • ✅ 可以并行执行其他任务
  • ✅ 完成后主动通知
  • ✅ 实时输出进度

📋 执行流程

1️⃣ 异步调用子 agent

sessions_spawn({
  agentId: "agent-ge",  // 或 agent-cc
  task: "清理开发机日志和临时文件",
  mode: "run",
  streamTo: "parent",
  label: "dev-cleanup"
})

2️⃣ 子 agent 执行清理

SSH 到 datax 开发机,执行:

# 检查清理前磁盘状态
df -h

# 清理 7 天前的 .log 文件
find /mnt/www -name '*.log' -mtime +7 -delete

# 清理 3 天前的 tmp_* 文件
find /mnt/www -name 'tmp_*' -mtime +3 -delete

# 清理 Docker 悬空镜像(可选)
docker image prune -f

# 检查清理后磁盘状态
df -h

3️⃣ 实时播报进度

清理过程中输出:

  • 📊 清理前磁盘使用率
  • 🗑️ 正在删除 XXX 文件...
  • ✅ 清理完成
  • 📊 清理后磁盘使用率
  • 💾 腾出 XX GB 空间

4️⃣ 完成后通知

清理完成后自动通知:

✅ 开发机清理完成!

清理结果:
- 删除日志文件:XX 个
- 删除临时文件:XX 个
- 腾出空间:1.2 GB

当前状态:
- 根分区 (/):87% → 85%
- 数据分区 (/mnt):60% → 59%

⚙️ 配置说明

清理规则:

文件类型保留时间清理位置
*.log7 天/mnt/www 及子目录
tmp_*3 天/mnt/www 及子目录
Docker 悬空镜像总是所有悬空镜像

安全边界:

  • ❌ 不删除 7 天内的日志
  • ❌ 不删除 3 天内的临时文件
  • ❌ 不删除业务数据文件
  • ❌ 不删除配置文件

📝 使用示例

用户:让老高去打扫卫生
助手:好的,老高正在去开发机清理日志...(异步执行)

用户:让顺子检查 DataWorks 任务
助手:好的,顺子正在检查...(并行执行)

[1 分钟后]
老高:✅ 开发机清理完成!腾出 1.2GB 空间

🔧 技术实现

主会话(我):

// 收到"打扫卫生"指令
sessions_spawn({
  agentId: "agent-ge",
  task: `
    1. SSH 到 datax 开发机
    2. 执行清理命令
    3. 报告清理结果
  `,
  mode: "run",
  streamTo: "parent",
  label: "dev-cleanup-${Date.now()}"
})

// 立即回复用户
"好的,老高正在去开发机打扫卫生,完成后会通知你~"

子 agent(老高):

  • 接收任务后 SSH 到开发机
  • 执行清理命令(bash)
  • 实时输出进度
  • 完成后返回结果

⚠️ 注意事项

  1. 并发控制: 避免同时启动多个清理任务
  2. 磁盘空间: 清理前检查磁盘使用率,>90% 时告警
  3. 日志记录: 清理结果记录到 memory/dev-cleanup-YYYY-MM-DD.md
  4. 错误处理: SSH 失败时立即通知用户

版本历史:

  • v1.0 (2026-03-12): 初始版本,异步执行不阻塞

Comments

Loading comments...