Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
AI Safety Rails
v1.0.0Automatically configures safety rules, trust levels, prompt injection defense, and approval workflows to secure OpenClaw agent actions.
⭐ 0· 31·0 current·0 all-time
byzinou@casperzinou
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill claims to set up safety rules and a trust ladder, which is coherent. However, the SKILL.md refers to reading files, messages, and emails and to using a 'verified messaging channel' (e.g., Telegram) while the manifest declares no required config paths or credentials. That is an incoherence: if the skill needs access to messaging channels or personal mail/files, those credentials/configuration should be declared. The instructions also instruct installing two additional packages (ai-sentinel, skill-guard) not present in the manifest, expanding its real capabilities beyond the stated scope.
Instruction Scope
The SKILL.md explicitly instructs running remote install commands (npx clawhub@latest install ai-sentinel; npx clawhub@latest install skill-guard). Because this is an instruction-only skill, these runtime steps would cause arbitrary remote code to be fetched and executed, which is outside the simple 'generate safety rules' description. The instructions also allow the agent to read files/messages/emails depending on trust rung without documenting how those sources are accessed or constrained.
Install Mechanism
There is no formal install spec in the registry entry, but the SKILL.md tells the agent to run npx commands to install other packages. Using npx at runtime fetches and executes code from registries and is a higher-risk install mechanism—especially since the packages (ai-sentinel, skill-guard) and the installer (clawhub@latest) lack provenance (no homepage, unknown owner). The package.json included has no dependencies listed, so those runtime installs are the only mechanism to add functionality and are not tracked in the manifest.
Credentials
The manifest declares no required environment variables or config paths, yet the skill's behavior implies it will need access to messaging channels and potentially files/emails. That mismatch means the skill could request or access credentials at runtime without them being declared up front. Additionally, installing third-party packages increases the chance those packages will request further credentials or access.
Persistence & Privilege
The skill does not request 'always: true' and is user-invocable (normal). However, instructing the agent to install additional skills/tools at runtime (via npx/clawhub) can expand the agent's installed surface and privileges beyond the original skill. This chaining of installs is a structural risk: the skill itself doesn't persist special privileges, but the packages it installs might.
What to consider before installing
This skill's goal (safety rails) seems reasonable, but pay attention to two red flags before installing: (1) The SKILL.md tells the agent to run npx clawhub@latest install ai-sentinel and install skill-guard — those are remote installs of unverified packages and will execute code from external sources. Verify the exact packages and their source code (ai-sentinel, skill-guard, and the clawhub installer) before running them. (2) The skill references reading files, messages, and email channels but declares no config paths or credentials; ask the author which credentials or integrations are required and why they aren't declared. Recommended steps: do not run the npx commands until you inspect those packages' code and provenance; request links to the packages or a formal install spec; prefer manual installation in a sandboxed environment; require explicit, least-privilege credentials for any messaging channels and audit any additional tools the skill installs. If you proceed, test in an isolated environment and monitor network/file access.Like a lobster shell, security has layers — review code before you run it.
latestvk975cqghv91s6a0h0nx5h23xy984t0bf
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
