Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Ctf Writeup
v1.0.0Generates a single standardized submission-style CTF writeup for competition handoff and organizer review. Use after solving a CTF challenge to document the...
⭐ 0· 51·0 current·0 all-time
by@gandli
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description match the instructions: generating a submission-style writeup from challenge files. Requiring a filesystem-capable agent and use of bash/Python is coherent. Minor mismatch: allowed-tools includes WebFetch/WebSearch which are not referenced in the instructions and are unnecessary for offline writeup generation.
Instruction Scope
The SKILL.md explicitly instructs the agent to run broad filesystem scans (find . and recursive grep) and to collect 'solution artifacts' and flags from the current session and challenge files. Those commands can read any file under the working directory (or repository root), potentially exposing unrelated sensitive files. The guidance 'Redact the flag only if the user explicitly asks for redaction' means the agent will include real flags by default, raising a risk of leaking sensitive contents.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk by an installer and no external packages are fetched. This is the lowest-risk install profile.
Credentials
No environment variables or credentials are requested (good). However, the instructions permit reading arbitrary files and session data; that filesystem access can expose secrets (API keys, private notes, other flags) even though no env vars are declared. The skill does not require or justify broad filesystem access beyond the challenge directory.
Persistence & Privilege
always:false and no requests to modify agent/system configuration. The skill does not request permanent or elevated privileges.
What to consider before installing
This skill is generally coherent for producing CTF writeups, but it instructs the agent to search the entire working directory and to include real flags by default. Before installing or running it: (1) run it only in an isolated/sanitized challenge directory or a copy of the challenge files (not your home directory or repo root); (2) explicitly tell the skill to redact flags or sensitive data if you don't want real secrets in the output; (3) consider removing or narrowing the find/grep lines to target a known challenge folder; (4) avoid giving it web/network tools unless you need them; and (5) if you're unsure, test the skill on a non-sensitive sample to observe what files it reads and what it outputs.Like a lobster shell, security has layers — review code before you run it.
latestvk970t7fr2mz4xqyd6hsvhy8dnh83xxjv
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
