Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Ctf Misc
v1.0.0Provides miscellaneous CTF challenge techniques. Use for encoding puzzles, RF/SDR signal processing, Python/bash jails, DNS exploitation, unicode steganograp...
⭐ 0· 65·1 current·1 all-time
by@gandli
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (misc CTF techniques) match the provided content: many files document encodings, jails, RF/SDR, DNS, WASM, container escape, etc. The SKILL.md’s declared prerequisites (filesystem-based agent with bash, Python 3, and internet for optional tool install) are consistent with the command examples and Python snippets in the files. No unrelated environment variables, binaries, or config paths are requested.
Instruction Scope
The SKILL.md and supporting files contain concrete, actionable commands and code that perform local system inspection (e.g., /proc reads), network activity (dig, binding a DNS server, sockets), and exploitation techniques (marshal injection, container escape, BuildKit abuse). These are expected for a CTF techniques pack, but they are powerful—if executed on a real system or without proper authorization they could be abused. Also note a minor metadata mismatch: SKILL.md YAML sets metadata.user-invocable: "false" while the registry shows the skill as user-invocable:true; this is an internal inconsistency to be aware of.
Install Mechanism
Instruction-only skill with no install spec and no code files that will be installed or downloaded at runtime. The SKILL.md recommends installing common pip packages and OS packages (z3-solver, pwntools, ffmpeg, qrencode, etc.), but these are standard tooling for the described tasks and are not pulled automatically by the skill.
Credentials
The skill declares no required environment variables, credentials, or config paths. While some techniques described would interact with credentials or services when applied (e.g., DNS rebinding or BuildKit exploitation), the skill itself does not request or embed unrelated secrets.
Persistence & Privilege
The skill does not request persistent or privileged presence (always:false). It is instruction-only and does not modify other skills or system-wide agent settings.
Assessment
This is a reference pack of offensive/advanced CTF techniques (jail escapes, container breakouts, DNS exfiltration, marshal injection, etc.). That content is coherent with the skill's stated purpose, but many examples are powerful and could be misused on production systems. Before using: (1) do not run these techniques against systems you do not own or have explicit permission to test; (2) if you plan to execute any of the example commands, run them in an isolated lab (VM/container) and review each pip/apt install before running; (3) be aware the skill recommends network access and installing packages — the agent/human will need to opt into those installs; (4) note the small metadata inconsistency (SKILL.md marks user-invocable=false while registry metadata shows it as user-invocable): confirm the intended invocation policy with the publisher if that matters to you.Like a lobster shell, security has layers — review code before you run it.
latestvk97e85g9hegjx3tx7qpshthh0183x751
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
