Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Security Suite

security-suite Hacking Tools Pack – A Penetration Testing Framework security-suite, python, brute-force-attacks, desktop, exploitation, finder.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 9 · 0 current installs · 0 all-time installs
byBytesAgain2@ckchzh
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's name/description advertise a 'Hacking Tools Pack' / 'Penetration Testing Framework' (Fsociety) but the SKILL.md and the included script implement a simple local logging/management utility that records timestamped entries under ~/.local/share/security-suite. There is a clear mismatch between the claimed capabilities and what is actually provided.
Instruction Scope
SKILL.md and the script instruct only local operations: writing/reading log files under ~/.local/share/security-suite, searching logs, exporting logs to local files, and showing status. The instructions do not request network access, other system credentials, or reading unrelated system paths. However, the tool stores arbitrary user-provided input in logs, so sensitive data could be recorded locally if users log secrets.
Install Mechanism
There is no install spec (instruction-only skill) and no downloads. One script file is included in the package; nothing is being pulled from external URLs. This is low-risk from an install mechanism perspective.
Credentials
No required environment variables or credentials are declared. SKILL.md documents an optional SECURITY_SUITE_DIR env var to override the data directory, which is appropriate for a local storage tool.
Persistence & Privilege
The skill does not request always:true and does not declare modifications to other skills or global agent settings. It simply writes files to a local user data directory; this is expected for a CLI logging utility.
What to consider before installing
This package is inconsistent with its description: it advertises a full 'hacking tools' framework but only provides a local logging/notes utility. If you expected pentest tooling, this skill does not provide it. Before installing: 1) Review the full script (the provided script output was truncated in the package listing) to ensure there are no hidden behaviors or network calls later in the file. 2) Be aware any sensitive inputs you log with this tool will be written to ~/.local/share/security-suite; avoid logging secrets. 3) Prefer packages with a verifiable homepage, source repo, or maintainers — this package lists no homepage and the registry metadata is minimal. 4) If you proceed, run the script in a low-privilege environment and inspect its entire contents locally; do not run it as root or give access to other credentials.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk9773hexbvfd6hw0ptp9gj93h5838h4m

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Security Suite

A utility toolkit for managing security suite operations from the terminal. Run checks, analyze findings, generate reports, and manage configuration — all with timestamped logging and export support.

Commands

CommandDescription
security-suite run <input>Run a security task (or view recent runs with no args)
security-suite check <input>Perform a security check and log the result
security-suite convert <input>Convert data between formats or representations
security-suite analyze <input>Analyze security findings or data
security-suite generate <input>Generate security artifacts (keys, configs, etc.)
security-suite preview <input>Preview a security operation before executing
security-suite batch <input>Batch-process multiple security operations
security-suite compare <input>Compare two security states or configurations
security-suite export <input>Log an export operation (or view recent exports)
security-suite config <input>Store or review configuration settings
security-suite status <input>Log a status update (or view recent status entries)
security-suite report <input>Generate or log a security report
security-suite statsShow summary statistics across all categories
security-suite export <fmt>Export all data (formats: json, csv, txt)
security-suite search <term>Search across all logged entries
security-suite recentShow the 20 most recent activity log entries
security-suite statusHealth check — version, data dir, entry count, disk usage
security-suite helpShow full usage information
security-suite versionShow version (v2.0.0)

Each action command works in two modes:

  • With arguments: saves the input with a timestamp to <command>.log and logs to history
  • Without arguments: displays the 20 most recent entries for that command

Data Storage

All data is stored locally in ~/.local/share/security-suite/. Each command writes to its own dedicated log file (e.g., run.log, check.log, analyze.log). A unified history.log tracks all activity with timestamps. Data never leaves your machine.

Directory structure:

~/.local/share/security-suite/
├── run.log
├── check.log
├── convert.log
├── analyze.log
├── generate.log
├── preview.log
├── batch.log
├── compare.log
├── export.log
├── config.log
├── status.log
├── report.log
└── history.log

Requirements

  • Bash (with set -euo pipefail)
  • Standard Unix utilities: date, wc, du, tail, grep, sed, cat
  • No external dependencies or network access required

When to Use

  1. Running security checks on infrastructure — use run, check, and analyze to log and track the results of security scans, vulnerability assessments, and penetration tests
  2. Generating security reports for stakeholders — use report and export to compile findings and export them in JSON, CSV, or plain text for sharing
  3. Comparing security configurations across environments — use compare and config to document differences between staging and production security settings
  4. Batch-processing multiple security operations — use batch to log and track bulk security tasks like rotating credentials or scanning multiple hosts
  5. Previewing destructive security operations — use preview before executing sensitive changes to document what will happen, then run when ready

Examples

# Run a security scan and log the result
security-suite run "Nmap scan of 192.168.1.0/24 — 14 hosts found"

# Log a security check finding
security-suite check "SSH root login disabled on web-01, web-02, web-03"

# Analyze a vulnerability report
security-suite analyze "CVE-2024-1234 affects nginx < 1.25.4 — patched on 3 servers"

# Export all logged data as CSV
security-suite export csv

# Search for all entries related to SSH
security-suite search ssh

Configuration

Set the SECURITY_SUITE_DIR environment variable to change the data directory. Default: ~/.local/share/security-suite/

Output

All commands output results to stdout. Redirect to a file with > output.txt if needed. The export command writes directly to ~/.local/share/security-suite/export.<fmt>.


Powered by BytesAgain | bytesagain.com | hello@bytesagain.com

Files

2 total
Select a file
Select a file to preview.

Comments

Loading comments…