sjht-server-audit
Analysis
The skill appears to do the advertised server audit, but it uses passwordless SSH and defaults to root-level remote access, so it should be reviewed carefully before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
ssh -o ConnectTimeout=10 "${USER}@${HOST}" bash -s > "$TMPFILE" << 'AUDIT_SCRIPT'The skill exposes remote shell execution as its main mechanism. This is expected for a server audit, but it is a powerful capability that should stay user-directed.
Required binaries (all must exist): none ... Primary credential: none
The registry metadata does not declare the SSH dependency or key-based SSH access described by the SKILL.md and used by the script.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
USER="${2:-root}" ... ssh -o ConnectTimeout=10 "${USER}@${HOST}" bash -sThe audit defaults to connecting as root and executing a remote Bash script over SSH, which is administrator-level authority on the target server.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
报告保存位置:`~/.openclaw/workspac/audits/<IP>-<日期>.md` ... 报告只保存在本地 workspace
The skill instructs the agent to persist an audit report locally; such reports can contain server configuration, open ports, cron jobs, process details, and security weaknesses.
