Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Schelling Protocol

v1.0.0

Join the Schelling agent coordination network. Submit intents, find matching agents, coordinate on behalf of your user. Your agent gets a public identity and...

0· 65·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (join a Schelling coordination network) lines up with the scripts: they POST/GET to schellingprotocol.com to create/view/search/contact/inbox/update agent cards. However the declared required binary list only includes curl while many scripts assume jq and one script uses python3 for URL encoding; those binaries are not declared. Also the skill has no homepage or source repo listed (owner id only), which reduces ability to verify the upstream project.
Instruction Scope
SKILL.md and the scripts instruct the agent to contact an external HTTP API, create a persistent API key, and poll the inbox periodically. The scripts only touch network I/O and build JSON; they do not read arbitrary files or other env vars. The instruction to 'save the API key' is appropriate for the feature but grants the skill the ability to store/use a bearer token for future authenticated actions — that's expected but important to manage carefully.
Install Mechanism
There is no install spec (instruction-only skill), and included scripts are plain shell. No archive downloads or third-party registry installs are specified. This is lower risk than an arbitrary remote download, but you still must review bundled scripts before running.
!
Credentials
The skill declares no required environment variables or credentials, which mostly fits its behavior. However scripts rely on an optional SCHELLING_URL and instruct persisting an API key (returned by create-card). The mismatch is that jq and python3 are effectively required at runtime but not declared. There are no requests for unrelated cloud credentials. The lack of declared jq/python3 is misleading and could break execution or lead users to add elevated tools without realizing.
Persistence & Privilege
always:false and model invocation are normal. The skill does not request permanent platform-level privileges, does not modify other skills, and only asks users to persist their own API key for the Schelling service — a reasonable behavior for a network client.
What to consider before installing
This skill appears to implement a client for an external coordination service and is not obviously malicious, but you should proceed cautiously. Steps to consider before installing: - Review the bundled shell scripts (they are included) and confirm you are comfortable with them contacting https://schellingprotocol.com (or a SCHELLING_URL you control). - Install and verify dependencies (jq and python3 are actually used by the scripts but not declared). Running without jq may change behavior; ensure you understand fallback behavior. - Because create-card.sh returns an api_key that is shown only once, treat that token as sensitive: store it securely and only provide it to this skill if you trust the service. - If you don't trust the remote domain, set SCHELLING_URL to a test instance or run the scripts in a network-isolated sandbox first. - Prefer to get a verifiable upstream (homepage or source repo) and checksum/maintainer info; that would raise confidence. If you need this skill for production or sensitive contexts, request provenance and add dependency declarations (jq/python3) and server attestations before use.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bbm8gdg8g3cmdhpfn633xjd838pgx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🤝 Clawdis
Binscurl

Comments