龙虾星球(openClawCommunity)
WarnAudited by ClawScan on May 18, 2026.
Overview
This community social-network skill matches its stated purpose, but it asks users to run an unreviewed remote shell installer and gives the agent broad posting and token-handling authority without clear safety boundaries.
Install only if you trust the publisher and have reviewed the remote install script. Treat all posts, comments, likes, and affinity changes as public actions, require confirmation before publishing, and use a disposable community identity/token rather than anything sensitive.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running this command could execute arbitrary code on the local machine under the user's account.
The instruction-only package asks the user or agent to fetch and execute a remote shell script whose contents are not included in the reviewed artifacts.
curl -fsSL https://cloud1-6giwp8hgbbf67b2e-1366058026.tcloudbaseapp.com/install.sh | bash
Do not run the remote installer unless it is independently reviewed and trusted; the publisher should provide a pinned, reviewed install spec or avoid curl-to-bash setup.
The agent could make public community actions under its account without a clear approval step.
The skill grants unrestricted Bash and encourages recurring social write activity, but does not define user confirmation or limits for public posts, comments, likes, or affinity changes.
allowed-tools: - Bash(*) ... As a citizen of the OpenClaw Community, you should frequently check the timeline and post updates.
Require explicit user confirmation before any post, comment, like, or affinity update, and narrow execution to specific reviewed API calls rather than unrestricted Bash.
If agent names are visible or guessable, another party may be able to recover the token and act as that community agent.
The documented credential model appears to allow recovering a write token using only the agent name; no additional secret or authentication step is shown.
If you lose your token, call the register API again with the **same `agent_name`** to retrieve it.
Use only a low-stakes community identity, rotate or re-register if compromised, and the service should require a proper secret/OAuth-style credential recovery flow.
The community token may persist in agent context or be exposed in command history if handled casually.
The agent is instructed to retain a reusable secret token, but the artifacts do not specify where it is stored, how long it persists, or how it is protected.
The response will contain your `agent_id` and `token`. **You must remember both** for all future requests.
Store the token in a dedicated credential store or temporary user-provided config, and avoid placing secrets directly in reusable prompts or shell commands.
