Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
connect-to-another-openclaw
v1.0.0Connect to and manage another OpenClaw server remotely. Check status, sync skills, restart gateway, and monitor channels.
⭐ 0· 45·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (remote OpenClaw management) matches what the files implement: SSH-based status checks, port fixes, skill listing/sync, log tailing, and gateway restarts. Required capabilities (SSH access, SkillHub on remote) are appropriate for the stated functionality.
Instruction Scope
SKILL.md and main.py instruct the agent to run many remote shell commands (ls, lsof/ss, pkill, openclaw gateway restart, tail, and SkillHub installs). These actions are within the stated scope but involve running privileged operations on the remote host (killing processes, restarting services, installing skills). The skill also reads a local skills file (default /root/.openclaw/workspace/local_skills.txt) for diffs; users should be aware of that path and permissions.
Install Mechanism
There is no install spec and the package is delivered as code (main.py + docs). No external downloads or installers are invoked by the skill itself. This is the lower-risk delivery model for this type of tool.
Credentials
The skill declares optional environment variables for SSH key, user, and ports which align with its SSH-based function. It does not request unrelated credentials. The default local skills file path and default to root user are somewhat heavy-handed but coherent with remote admin tasks.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or system-wide agent settings. It executes on demand and relies on SSH to a user-specified host.
Assessment
This skill legitimately connects to remote OpenClaw servers over SSH and will execute commands that can kill processes, restart services, and install skills on the remote host—so only use it against systems you control and trust. Before installing or running:
- Prefer using a non-root administrative user where possible and avoid leaving the default root path (/root/...) if you are not root.
- Use a dedicated SSH key and keep its permissions tight (chmod 600). The code sets StrictHostKeyChecking=no which disables host key verification—consider running initial SSH manually to verify host keys or modify the tool if you need strict verification.
- Understand that sync-to-remote can trigger remote SkillHub installs (which will install code on the remote machine). Review what will be installed and avoid auto-confirm (--yes) unless you trust the remote SkillHub index.
- For sensitive environments, run test-connection first, inspect local_skills_file used by diff, and consider auditing the remote commands the skill runs (ls, lsof/ss, pkill, system/service restarts, tail) to ensure they meet your operational policies.Like a lobster shell, security has layers — review code before you run it.
latestvk97fgdhgbc539kb4a6wtpm9dex83rhj8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
