Autonomous Agent Toolkit
Analysis
The toolkit is not visibly malicious, but it should be reviewed because it encourages recurring autonomous agents, persistent memory, and scheduled external actions that can continue without per-action review.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Configure cron jobs for autonomous operation ... --message "Check HEARTBEAT.md. Execute pending tasks. Reply HEARTBEAT_OK if nothing."
The documented workflow creates recurring OpenClaw jobs that can keep invoking an agent and performing pending tasks outside the user's immediate session.
Content Scheduling ... --message "Read memory/x-trend-ideas.md and memory/x-analytics-log.md. Write and schedule tomorrow's posts using winning formats."
The reference material gives a recurring automation pattern that can create and schedule public content without an approval step in the cron message itself.
Source: unknown ... Version: 3.1.2 ... Required binaries (all must exist): none
The registry data gives an unknown source and no binary requirements even though SKILL.md instructs running python3 and openclaw cron commands; _meta.json also reports version 3.1.1.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`USER.md` | Context about the human operator | `MEMORY.md` | Long-term curated knowledge (agent maintains this)
The generated agent design stores operator context and persistent memory that future sessions are expected to read and trust.
