Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Everything Cli Search
v1.0.0Search files and folders on Windows using Everything CLI with advanced filters, wildcards, regex, macros, sorting, and real-time indexing features.
⭐ 0· 69·0 current·0 all-time
byDạ Hành Studio@dahanhstudio
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description match the included documentation and scripts: SKILL.md, README, EXAMPLES, and the Python/Bash wrappers are all designed to call Everything's es.exe CLI and expose its search features. No unrelated credentials, binaries, or surprising subsystems are requested.
Instruction Scope
The instructions correctly guide the user to install Everything and es.exe and show how to run search queries. However, the skill (and included docs) reference es.exe features that can access remote ETP/FTP servers (e.g., -connect "username:password@hostname:port") and the scripts will run arbitrary queries which could enumerate any files on the host. The Bash script (es_search.sh) builds a command string and calls eval on it, which can lead to shell injection if untrusted input reaches the script. The SKILL.md does not restrict or warn about using remote/ETP options and the examples include searching system and skill directories (expected) but these amplify the potential for sensitive-data exposure.
Install Mechanism
There is no automated install spec (instruction-only), which is low-risk. The repo contains documentation (INSTALL.md) that describes copying files into user OpenClaw directories, but no automated installer is present. Nothing in the package downloads or executes remote archives.
Credentials
The skill declares no required environment variables or credentials; the scripts accept an optional ES_PATH environment variable which is appropriate. One practical gap: the Bash script can output JSON via jq but jq is not documented as a required dependency. No secrets or unrelated credentials are requested by the skill itself.
Persistence & Privilege
The skill does not request always:true, does not declare elevated persistence, and does not modify other skills. It is user-invocable and can be invoked autonomously (platform default), which is expected for a search wrapper.
What to consider before installing
This package appears to be a straightforward wrapper around Everything's es.exe and its documentation matches the included scripts, but review the small risks before installing/using:
- Prefer the Python wrapper over the Bash script when possible: everything_search.py uses subprocess.run with argument lists (safer against injection). The Bash script builds a command string and runs eval, which can be exploited if inputs are not carefully sanitized.
- jq is used by the Bash script for JSON output but is not listed as a requirement; install jq or avoid the Bash JSON mode.
- Everything/es.exe can connect to remote ETP/FTP endpoints and can search the entire filesystem; avoid enabling or using remote connection options unless you understand the network exposure and credentials involved.
- The skill's source is marked "unknown". If you don't trust the author, inspect the files yourself (the code is short and readable) or run in a sandbox/VM before granting it access to your real workstation.
- If you plan to call these scripts programmatically, ensure you sanitize any user-provided query/path values to prevent shell injection (or use the Python script which handles arguments more safely).
If you want a safer thumbs-up: confirm the publisher identity, ensure es.exe is the official Voidtools binary, and avoid running the bash script with untrusted inputs or elevated privileges.Like a lobster shell, security has layers — review code before you run it.
latestvk97e90ngddqd8gqtprmar4z28983rd7a
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
