Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Foxcode OpenClaw
v1.2.4Configure and manage Foxcode AI models in OpenClaw. Guides users through API setup, endpoint selection, primary/fallback model configuration, and status moni...
⭐ 0· 393·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description align with the code: scripts configure endpoints, select models, validate config, and check endpoint status. Requiring access to ~/.openclaw files and network access is coherent with its purpose. Minor mismatch: registry metadata lists no required env vars but the docs/scripts reference FOXCODE_API_TOKEN as an option.
Instruction Scope
SKILL.md and README explicitly instruct the tool to modify critical OpenClaw files (~/.openclaw/openclaw.json and ~/.openclaw/agents/main/agent/auth-profiles.json) and to save API keys. That's expected for a configurator, but the materials and scripts disagree on the canonical location for the API token: configure_foxcode.py states the apiKey is stored in auth-profiles.json and omits apiKey from openclaw.json, while validate_config.py requires an apiKey field inside the foxcode provider in openclaw.json (and will also accept env var references). This inconsistency grants the tool broad discretion over where secrets are placed and could lead to accidentally writing tokens to less-secure files.
Install Mechanism
No install spec; the skill is instruction-only and ships Python scripts. No remote downloads or installers are executed automatically by the platform. This is lower risk than arbitrary installers, but running the provided scripts will perform file writes and network calls.
Credentials
Registry metadata lists no required env vars, but references to FOXCODE_API_TOKEN appear in docs and references/openclaw-config.md, and validate_config.py can interpret ${FOXCODE_API_TOKEN}. The skill will prompt for and store an API token; because scripts disagree about where the token should live (auth-profiles.json vs openclaw.json) there is risk of storing secrets in different locations or in config files that may be world-readable unless the user enforces permissions. No other unrelated credentials are requested.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges. It modifies user OpenClaw config files (its stated purpose) but does not alter other skills or request global agent settings.
What to consider before installing
This skill is plausible for configuring Foxcode in OpenClaw, but exercise caution before running it:
- Review the scripts first. The wizard will modify ~/.openclaw/openclaw.json and ~/.openclaw/agents/main/agent/auth-profiles.json and may write your API token. Confirm exactly where the token will be stored.
- The code is inconsistent: configure_foxcode.py says API keys go in auth-profiles.json, while validate_config.py expects an apiKey inside openclaw.json (or ${FOXCODE_API_TOKEN}). That mismatch can lead to secrets being placed in the wrong file or validation failures. Ask the author to clarify or patch the scripts so they agree on a single secure storage location.
- Back up ~/.openclaw (as the README/skill already warns) and verify file permissions (chmod 600) after the change. Use a throwaway/limited-scope token if possible when testing.
- Affiliate/redirect domains (rjj.cc) are used for registration and status pages; this is likely monetization but double-check links before visiting and prefer direct provider pages if you have them.
- If you are not comfortable inspecting or running Python scripts, decline installation or run them in an isolated environment (container or VM). If the author can provide a short changelog or a signed release and update the registry metadata (declare FOXCODE_API_TOKEN if it's required/expected), that would raise confidence.
Confidence is medium: findings look like sloppy/inconsistent engineering rather than deliberate exfiltration, but the secret-storage inconsistencies justify labeling this 'suspicious' until clarified.Like a lobster shell, security has layers — review code before you run it.
ai-configurationvk977qeh3a0s4qtmbamayrm030s8218avclaudevk977qeh3a0s4qtmbamayrm030s8218avfoxcodevk977qeh3a0s4qtmbamayrm030s8218avlatestvk977qeh3a0s4qtmbamayrm030s8218avmodel-configvk977qeh3a0s4qtmbamayrm030s8218avopenclawvk977qeh3a0s4qtmbamayrm030s8218avsetup-wizardvk977qeh3a0s4qtmbamayrm030s8218av
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
