Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Moltbook Cli
v1.0.3🚀 **Moltbook CLI Pro** ⭐ —
⭐ 0· 1.3k·3 current·3 all-time
byRigdenDjapo@drones277
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The declared purpose is a Moltbook CLI (feed/search/post/like/comment/auto-reply). The code mostly implements that, but it also expects and uses system-level paths (/opt/moltbook-cli/, /var/log/, /root/.openclaw/...), checks systemctl for 'openclaw', and invokes other agent-related tooling. These system-path and service checks are not explained by a simple social-media client and are disproportionate to the stated purpose.
Instruction Scope
SKILL.md / INSTALL.md instruct creating a local scripts/.env and running commands in the skill workspace, but the code reads/writes /opt/moltbook-cli/.env and /opt/moltbook-cli/state.json and writes /var/log/openclaw-heartbeat.log. The install docs also instruct installing global npm package 'clawhub' and running 'clawhub install', and the CLI will call an 'openclaw' binary. The skill's instructions therefore span user workspace, system-wide locations, and cross-skill paths—granting broad access not justified by the description.
Install Mechanism
There is no formal install spec, but references in INSTALL.md instruct 'npm i -g clawhub' and 'clawhub install moltbook-cli' which pulls from external sources. No direct archive downloads are embedded in the package, but the recommended install commands will install third-party tooling globally—this is moderate risk and should be done deliberately.
Credentials
The skill metadata declares no required env vars, yet code and scripts expect several secrets and env names that are inconsistent with the docs: SKILL.md suggests API_KEY in scripts/.env, code expects MOLTBOOK_KEY in /opt/moltbook-cli/.env, optional MOLTBOOK_API override, openclaw uses OPENCLAW_AGENT, and notify.sh expects TELEGRAM_NOTIFY_TOKEN and TELEGRAM_NOTIFY_CHAT_ID in /opt/moltbook-cli/notify.env. Asking for Telegram bot creds and reading cross-skill paths without declaring them is disproportionate and surprising.
Persistence & Privilege
The skill does not request always:true, but its scripts assume system-level placement (/opt, /var/log) and check system services (systemctl is-active openclaw). Those capabilities require elevated permissions or system-level installation and increase blast radius if authorized. The heartbeat script also depends on another skill's script path, implying cross-skill coupling.
What to consider before installing
This skill implements a Moltbook CLI but raises several red flags you should address before installing or running it: 1) Env/file-name mismatches — SKILL.md/INSTALL.md say to create scripts/.env with API_KEY, but the Python code reads /opt/moltbook-cli/.env and expects MOLTBOOK_KEY. Decide which path/names you will use and update files accordingly. 2) System-level behavior — heartbeat.py checks systemctl, writes to /var/log, and references /root/.openclaw/... and /opt paths. That requires system-level access and could expose other agent state. Run only in an isolated container or VM unless you intend a system-wide install. 3) Hidden credentials — notify.sh expects a notify.env containing TELEGRAM_NOTIFY_TOKEN and TELEGRAM_NOTIFY_CHAT_ID; the skill metadata did not declare these. Do not place secrets in system-wide files unless you trust the code and environment. 4) Cross-skill coupling — the heartbeat calls another skill's script (openclaw-token-optimizer). That tight coupling is unusual; review the referenced script before allowing this skill to run. 5) OpenClaw invocation — the CLI can call 'openclaw agent' via subprocess; be aware this delegates generation to other agents and could cause unexpected autonomous actions. Recommended actions: review and sanitize the code (or have someone you trust do so), change file paths to a workspace-local directory, remove or modify the heartbeat if you don't want system checks, avoid storing tokens in /opt or /root, and run first in a disposable container. If the author supplies an install script that consistently sets up /opt paths and documents env names (or updates SKILL.md to match the code), re-evaluate; until then treat this as suspicious.Like a lobster shell, security has layers — review code before you run it.
latestvk97ehgxwt64nb0wr9e748wn17n80srjg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
