Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Debug Prompt Driven Cron Agent Zero Output

v1.0.0

用于排查“定时任务成功执行但结果全为 0 / 未检索到样本 / 明明有数据却日报为空”这类问题,尤其适合 Discord、Obsidian、cron、agentTurn、prompt 驱动任务、日整理、复盘脚本、采样漏扫、thread starter 漏计、主频道消息未纳入、Snowflake 字符串比较、时区时...

0· 80·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill says it will diagnose 'cron/agentTurn/prompt-driven tasks that produce all-zero outputs' and all runtime instructions are about locating job configs, run records, output files, and comparing those to known Discord threads — which are exactly the artifacts one would inspect for this problem. It does not request unrelated credentials or binaries.
Instruction Scope
The SKILL.md directs the agent to read local files and directories (cron jobs.json, cron run records, Obsidian output files, and workspace/search paths). This is coherent for debugging but notable: it uses concrete absolute example paths (e.g., /Users/can4hou6joeng4/...) that may be specific to a sample user and could cause the agent to attempt reading similar local paths on a host. The instructions do not instruct exfiltration or contacting external endpoints beyond the diagnostic context.
Install Mechanism
No install spec and no code to write to disk — instruction-only skill, lowest install risk.
Credentials
The skill declares no environment variables, no credentials, and requires no config paths beyond read-only local files relevant to debugging. There are no disproportionate secret requests.
Persistence & Privilege
always:false (default) and no special privileges are requested. Be aware the platform allows autonomous invocation by default; because this skill's instructions involve reading local files, enabling autonomous runs without user oversight increases privacy exposure. This is a platform-wide default rather than a property of this skill, but users should consider invocation controls.
Assessment
This skill is internally coherent and appears designed to do exactly what it says: inspect local cron job configs, run logs, and output files to determine whether an empty report was caused by upstream sampling vs downstream classification. Before installing or enabling autonomous runs: 1) review and, if needed, edit the example absolute paths in SKILL.md so the agent only reads directories you expect (or test in a staging account), 2) ensure the agent is not granted broad unattended access to sensitive files you don't want it to read, 3) prefer manual invocation for the first few runs to confirm behavior and outputs, and 4) if you rely on this in production, add audit/logging (as the skill itself recommends) so subsequent runs record which channels/threads/messages were scanned. No credentials are requested, which reduces risk, but local-file access still carries privacy risk — restrict invocation scope accordingly.

Like a lobster shell, security has layers — review code before you run it.

latestvk97874wmdq3sh4gcmq6gpgmspx83d48t

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧭 Clawdis

Comments