Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Session History

v1.0.0

Search and browse past conversation history across all sessions. Use when recalling prior work, finding old discussions, resuming dropped threads, or when th...

0· 685·1 current·1 all-time
by@amor71@amor71
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (search/browse past session history) align with the included script and SKILL.md, which explicitly read session JSONL files under ~/.openclaw/agents/*/sessions/. No unrelated binaries, env vars, or external services are requested.
Instruction Scope
SKILL.md and the script instruct the agent to read local transcript files and use a 'sessions_history' tool when available. This is within the skill's stated scope, but the behavior involves reading potentially sensitive local conversation transcripts; SKILL.md advises summarizing rather than dumping raw transcripts, while the script prints excerpts and file paths. The instructions also reference external agent tools (sessions_history, read, memory_search) that are not part of this package — the agent must have those tools available.
Install Mechanism
No install spec; instruction-only plus a local Python script bundled with the skill. The script uses only Python standard library modules and does not download or execute remote code.
Credentials
The skill requests no environment variables, credentials, or config paths. It accesses the user's home directory (~/.openclaw) which is appropriate for its purpose of searching local session files.
Persistence & Privilege
always:false and no code attempts to modify other skills or system-wide settings. The skill has no elevated persistence or privileged installation steps.
Assessment
This skill legitimately reads your local OpenClaw session transcripts (~/.openclaw/agents/*/sessions/*.jsonl) and prints matching excerpts and file paths. Before installing, confirm you are comfortable granting the agent access to your local transcript files (they may contain sensitive data). Note the SKILL.md recommends summarizing results rather than pasting full transcripts — follow that guidance. Also verify your agent environment provides the referenced helper tools (sessions_history, read, memory_search) if you expect the workflow to use them. There are no network calls or secret requests in the code, so the main risk is local privacy exposure rather than external exfiltration.

Like a lobster shell, security has layers — review code before you run it.

latestvk978wskbn1h0zhgxwcm2q1npas81ewmx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments