Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
runbook-generator
v1.0.0Runbook Generator
⭐ 0· 251·4 current·4 all-time
byAlireza Rezvani@alirezarezvani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (runbook generator) matches the instructions: scanning a codebase, detecting stack components, and producing runbooks. The kinds of checks and templates (deployment, incident response, DB maintenance) are consistent with the stated goal.
Instruction Scope
SKILL.md instructs scanning repository files (ls, grep, git log) which is expected, but also includes concrete shell commands that assume access to credentials and runtime tools (psql, npx prisma, vercel CLI, curl with TEST_TOKEN). It includes potentially destructive operations (prisma migrate reset) and production rollbacks without explicit safeguards or confirmation steps. The guidance gives agents broad discretion to run admin commands that could modify production state.
Install Mechanism
Instruction-only skill with no install spec or downloaded artifacts, which is low risk from an installation perspective.
Credentials
SKILL.md references many credential-like environment variables and tokens (DATABASE_URL, STAGING_DATABASE_URL, PROD_DATABASE_URL, TEST_TOKEN, PagerDuty/Slack contacts) but the skill declares no required env vars. It also assumes availability of CLIs and access to production secrets. Requesting or using production credentials is disproportionate for an automatically invoked agent unless explicit human approval and least-privilege controls are in place.
Persistence & Privilege
The skill is not always-enabled and uses normal autonomous invocation defaults. It does not request permanent platform-wide presence or modify other skills. However, autonomous invocation combined with the instruction issues above increases risk, so consider limiting autonomy or requiring human confirmation before executing commands.
What to consider before installing
This skill appears to do what it says (generate runbooks from a repo), but its runtime instructions assume access to repository files, various CLIs (git, jq, psql, prisma, vercel), and sensitive environment variables (production/staging DB URLs, test tokens, PagerDuty/Slack contacts) that are NOT declared. Before installing or enabling it: (1) do NOT provide production credentials to the skill; test only on a copy of the repo or in staging; (2) require explicit human approval before any command that can change state (migrations, resets, rollbacks); (3) restrict agent autonomy (disable automatic execution of destructive steps) or add a confirmation/approval step in the workflow; (4) ensure the runtime environment has the necessary CLIs if you intend to use the command examples, or treat the outputs as templates for a human to execute; (5) consider asking the skill author to declare required env vars and binaries and to add non-destructive dry-run defaults. If you need absolute safety, avoid giving the agent any secrets and only use it for read-only analysis and draft runbook generation.Like a lobster shell, security has layers — review code before you run it.
latestvk977am62mzj98s3atvn9ydb00182qjzb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
