Laravel Forge

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

This skill is classified as suspicious due to its inherently high-risk capabilities, which include extensive remote command execution (RCE) and sensitive credential management on Laravel Forge infrastructure. The `scripts/laravel-forge.sh` file provides functions like `cmd_commands run`, `cmd_deployments update-script`, `cmd_recipes create/run`, `cmd_jobs create`, and `cmd_background_processes create`, all of which allow arbitrary command execution on remote servers. Additionally, it manages SSH keys, database credentials, and cloud storage provider access keys. While the script itself does not exhibit malicious intent (e.g., no hidden exfiltration or backdoors, and it uses `jq` safely for JSON construction), these powerful functionalities, if misused or if the OpenClaw agent is compromised, could lead to complete infrastructure compromise, data exfiltration, or persistence on remote systems. The `SKILL.md` openly documents these capabilities, indicating they are part of the skill's intended purpose.