CrazyOzzy Auto Updater

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: crazyozzy-auto-updater Version: 1.0.1 The crazyozzy-auto-updater skill is a maintenance utility designed to automate updates for the OpenClaw platform and its associated skills. It utilizes standard system commands (openclaw update, clawhub update) and provides clear instructions for the agent to configure scheduled tasks using the platform's native cron tools. No evidence of data exfiltration, malicious execution, or unauthorized persistence was found across SKILL.md or the reference guides.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A future scheduled run could change or break the assistant and installed skills before you review the exact updates.

Why it was flagged

This instructs a scheduled agent to run local update tools that mutate the OpenClaw runtime and every installed skill. The artifacts do not define per-update approval, pinning/exclusions, rollback, or failure containment.

Skill content
Use an **isolated scheduled agent turn** that:

1. Runs `openclaw update` ...
2. Runs `clawhub update --all`
Recommendation

Use dry-run or confirmation-first setup for initial runs, keep backups or rollback plans, pin or exclude sensitive skills, and review update summaries.

What this means

The updater may continue running on its schedule and making changes even when you are not actively using the agent.

Why it was flagged

The recurring scheduled job is disclosed and matches the purpose, but it is persistent automation that will keep running after setup unless disabled.

Skill content
This skill helps set up an automated job that:

1. Updates **OpenClaw** itself
2. Updates installed skills via **ClawHub**
Recommendation

Confirm the schedule, notification path, and disable/removal process before enabling it.

What this means

It is harder to verify who published or maintained a skill that can configure broad automatic updates.

Why it was flagged

The embedded owner ID differs from the registry owner ID shown in the provided metadata, and the registry lists the source as unknown with no homepage. Because this is instruction-only, this is a provenance note rather than direct malicious behavior.

Skill content
"ownerId": "kn73fehpspmvrqqdvz7jjdb50d7z4h5s"
Recommendation

Verify the publisher and install only from a trusted registry/source before enabling unattended updates.