Skill flagged โ suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Autonomous Agent Toolkit
v3.1.2Create, configure, and orchestrate autonomous AI agents on OpenClaw. Automaton Edition - Built by Forge ๐ฆ.
โญ 0ยท 104ยท0 currentยท0 all-time
MIT-0
Download zip
LicenseMIT-0 ยท Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description align with the provided generator, docs, and cron patterns. The included Python generator creates the expected workspace files. However _meta.json version (3.1.1) doesn't match registry metadata (3.1.2), and tests expect unrelated skills (e.g., 'self-evolve') to be installed โ these mismatches reduce confidence that metadata and runtime expectations were maintained.
Instruction Scope
SKILL.md instructs creating cron jobs that may check external APIs (e.g., 'Check sales API') and route work to different models, but the skill declares no required env vars or credentials. The SKILL.md also encourages autonomous crons and file-based inter-agent communication; while coherent for an autonomy toolkit, it grants broad operational behavior (scheduling, reading/writing workspace files) that could act on external systems if credentials are later provided. The runtime instructions do not ask to read unrelated system secrets, but the cron examples imply external network access and use of APIs which will require credentials that the skill does not document.
Install Mechanism
No install spec (instruction-only) and included source files are small and human-readable. No downloads or extracted archives are present. This is lower-risk than an install that fetches code from arbitrary URLs.
Credentials
The skill requires no environment variables or credentials in metadata, yet its cron examples mention checking external APIs and sales systems. That implies the real deployment will need API keys/credentials, but none are declared or scoped here. Tests also assume a specific workspace path (C:\Users\Administrator\.openclaw\workspace) and presence of other skills, which is unrelated to the generator's stated purpose and could lead to inappropriate filesystem reads if the test is executed unmodified.
Persistence & Privilege
always is false and autonomous invocation is enabled (default). The skill instructs users to set up cron jobs for autonomous operation. Autonomous invocation combined with cron-based scheduling can increase impact if the agent is given credentials or network access later โ this is expected for an autonomy toolkit, but the user should be aware that enabling scheduled crons effectively gives long-running autonomous actions.
What to consider before installing
What to check before installing:
- Review the two code files locally (scripts/generate_agent.py and tests/health-check.js). The generator is benign and writes workspace files, but the health-check script has brittle and possibly unsafe assumptions: it hardcodes a Windows admin workspace path (C:\Users\Administrator\.openclaw\workspace), looks for other skills (e.g., 'self-evolve'), and expects files that the generator does not create. Running that test unmodified could read unexpected files in your environment โ do not run it with elevated privileges.
- Confirm which external APIs/crons you will configure. The SKILL.md shows cron examples that check sales APIs and other external systems; you will need to supply credentials for those. The skill metadata declares no env vars/keys โ ensure you do not provide secrets unless you understand exactly which cron/tasks will use them and where they are stored.
- Address metadata mismatches (registry version vs _meta.json) and the test's dependency on other skills. Ask the maintainer or inspect the repo to ensure you have the intended release and that tests are up-to-date.
- If you plan to enable autonomous cron jobs, apply least privilege: limit what the agent can do (kill switches, red lines), run in a sandbox or isolated workspace, and avoid granting external service keys until you've audited the cron actions and code.
- If unsure, run the generator in a disposable directory and inspect outputs before wiring crons or giving network/credential access. If you need higher assurance, request an updated release that removes hardcoded paths, documents required credentials, and aligns metadata/tests with the generator's behavior.Like a lobster shell, security has layers โ review code before you run it.
latestvk979yq3btbxjsfs2r5n693qz0583hk8d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
๐ฆ Clawdis
