Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
GitHub Memory Sync
v1.1.0将 OpenClaw 的完整工作空间配置(SOUL.md, IDENTITY.md, USER.md, MEMORY.md, TOOLS.md, memory/*等)同步到 GitHub 进行备份和版本控制,支持跨服务器迁移。Use when user mentions GitHub backup, sync m...
⭐ 0· 532·3 current·3 all-time
byDavin Wang@davinwang
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's stated purpose (backup/sync OpenClaw workspace to GitHub) aligns with the included scripts and docs. However there are manifest inconsistencies: the top-level registry metadata claims no required env vars, while clawhub.yaml and SKILL.md require GITHUBTOKEN and GITHUB_REPO. The included LICENSE text (GPLv3) conflicts with metadata saying MIT. These mismatches indicate sloppy packaging and deserve attention before trusting the skill.
Instruction Scope
SKILL.md and the scripts explicitly copy highly sensitive files (SOUL.md, IDENTITY.md, USER.md, MEMORY.md, memory/*, skills/, projects/agents, BOOTSTRAP.md). Although SKILL.md warns not to upload openclaw.json channel credentials, the scripts do not explicitly exclude files like openclaw.json or other secret-containing files. The docs even demonstrate adding tokens inline in cron lines (which would store tokens in crontab). This combination creates a real risk of accidental secrets exfiltration.
Install Mechanism
No external downloads or package installs are performed; this is an instruction-only skill with two shell scripts. That reduces supply-chain risk. The scripts are executable and will be run on the host, so local script behavior is the primary risk rather than remote fetches.
Credentials
The skill requires a GitHub PAT (GITHUBTOKEN) and repository name — reasonable for GitHub sync. But the scripts embed the token into HTTPS clone/push URLs (REPO_URL="https://${GITHUB_TOKEN}@github.com/${GITHUB_REPO}.git"), which can cause credentials to be saved in git metadata or appear in process contexts. The cron examples and CRON.md show placing tokens directly in crontab or environment files, raising further exposure risk. Defaults in cron-backup.sh (a hardcoded GITHUB_REPO owner) are suspicious and may cause misconfiguration.
Persistence & Privilege
The skill does not request always:true and is user-invocable only. However the documentation encourages adding a cron job for automated backups and shows patterns that would persist credentials (crontab/environment) on the host. Persisting scheduled execution combined with insecure token handling increases blast radius; treat automatic installation of cron entries with caution.
What to consider before installing
This skill's functionality matches its description, but it contains insecure defaults and packaging mistakes you should address before using it on sensitive data. Key actions to consider before installing or running:
- Do not paste a long-lived PAT into crontab or /etc/environment. Use short-lived tokens or a deploy key with minimal scope when possible, and rotate tokens after testing.
- The scripts build an HTTPS URL with the token embedded. That can leave tokens in .git/config or process contexts. Prefer using a credential helper, the GitHub CLI (gh auth), or SSH deploy keys instead of embedding tokens in URLs. Remove credentials from .git/config after pushes.
- The scripts copy many files and do not explicitly exclude openclaw.json or other config files; add explicit excludes (e.g., a .gitignore or modify copy_workspace_files to skip openclaw.json, any secrets/ or tokens files) and verify the repo contents before pushing.
- Avoid backing up sensitive channel credentials; manually review files to be synced or run the script with --memory-only if you only need memory files.
- Fix manifest mismatches (registry env metadata vs clawhub.yaml, and license mismatch) or request a corrected package from the author before trusting it.
- If you must use automation, prefer a systemd timer running a wrapper that loads credentials from a protected file with restricted permissions (not crontab), and ensure /var/log/openclaw-memory-sync.log is set with appropriate permissions and log-rotation.
If you cannot verify or modify the scripts, treat this skill as high-risk for accidental credential exposure and do not use it with production secrets or channel tokens.Like a lobster shell, security has layers — review code before you run it.
latestvk976t8jxhq5hpd5tzgf7f2r6n182gxts
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
