Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
run.dev — Local Dev Environment Manager
v0.1.0Local dev environment manager. Process management, automatic HTTPS domains, SSL certificates, reverse proxy, and AI crash diagnosis — single binary, zero con...
⭐ 0· 106·0 current·0 all-time
byDaniel Tamas@danieltamas
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name and description (local process manager, reverse proxy, hosts editing, SSL certs) align with the actions described in SKILL.md (installing a privileged helper, managing /etc/hosts, port forwarding, installing mkcert). Those privileged actions are logically required for the stated features, so capability set is coherent, but they are high-privilege for a single-binary local tool and deserve scrutiny.
Instruction Scope
SKILL.md explicitly recommends running a network-installed installer (curl -fsSL https://getrun.dev/install.sh | bash) and documents making system-wide changes: adding a NOPASSWD sudoers rule for a hosts helper, altering pfctl/iptables rules, installing mkcert, and managing /etc/hosts. It also advertises an 'AI crash diagnosis' / 'Ask Claude' feature that implies sending logs or error output to an external AI service — this is a privacy risk not fully described in the doc.
Install Mechanism
There is no registry install spec; the SKILL.md recommends a curl|bash one-liner that fetches and runs an install.sh from getrun.dev. Remote, unverified installers piped to sh are high-risk because they execute arbitrary code on the machine. The installer will write binaries and privileged helper config and modify network rules; users should want to inspect the script and its source before running it.
Credentials
The skill requests no environment variables or credentials in registry metadata, which is appropriate. However, the need for a NOPASSWD sudoers entry and a privileged helper is a form of elevated access that is disproportionate for casual tooling unless the user consents. The potential transmission of logs to an external AI (Claude) is a credential/privacy concern even though no keys are declared here — the SKILL.md does not explain whether data is sent off-host, what is sent, or how to opt out.
Persistence & Privilege
The installer claims to install a persistent privileged helper (sudoers NOPASSWD) and permanent port-forwarding rules (pfctl/iptables). While persistence is needed for editing /etc/hosts and port forwarding, NOPASSWD entries and kernel/network rule changes increase the blast radius of compromise and should be justified explicitly and reversible. The skill metadata does not request 'always: true', but the installation behavior itself grants elevated, persistent privileges on the host.
What to consider before installing
This skill looks functionally coherent with a local dev manager, but it requires high privileges and its recommended installer is a risky curl | bash flow. Before installing: 1) Inspect the install script at https://getrun.dev/install.sh (do not run it blind). 2) Verify the upstream project (GitHub repo, release tags, maintainers) and prefer signed releases or package-manager installs. 3) Confirm the installer’s exact sudoers change and consider rejecting NOPASSWD or running the helper with explicit sudo prompts. 4) Understand and opt out of any log-sharing to external AI (Claude); don't send sensitive project/log data. 5) Consider running in a disposable VM/container if you want to limit host changes. 6) Ensure the tool provides a trustworthy uninstall that truly reverts sudoers, hosts, and iptables/pfctl changes. If you cannot verify the installer or source, treat the installation as high risk.Like a lobster shell, security has layers — review code before you run it.
latestvk975a6jpwz8sq2vyh1g6fg1bd9834bty
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
