Cron & Scheduling
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: cron-scheduling Version: 1.0.0 The skill bundle is classified as suspicious due to its provision of extensive capabilities for arbitrary command execution and system configuration modification, which, while plausibly needed for a 'cron-scheduling' skill, represent significant high-risk behaviors. Specifically, the `SKILL.md` demonstrates commands like `crontab -e` (editing user crontabs), `sudo crontab -u` (editing other users' crontabs), `crontab -r` (removing all cron jobs), and includes a `cron-wrapper.sh` script that explicitly executes arbitrary commands provided as arguments. While there is no clear evidence of intentional malicious behavior by the skill's author, these broad permissions and execution capabilities could be leveraged for harmful actions if misused by a malicious user interacting with the AI agent.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A user or agent following the example incorrectly could delete existing scheduled jobs.
The guide documents a command that can remove all cron jobs for a user. It is clearly labeled with a caution and is relevant to crontab management, but misuse could disrupt scheduled tasks.
# Remove all cron jobs (be careful!) crontab -r
Confirm the target crontab and make a backup with `crontab -l > backup.txt` before removing or replacing scheduled jobs.
Using these commands can modify jobs that run as another system user, which may affect services or production workloads.
The skill includes privileged administration of another user's crontab. This is purpose-aligned for scheduling administration, but it crosses user/account boundaries.
# Edit another user's crontab (root) sudo crontab -u www-data -e
Use privileged cron or systemd commands only when the user explicitly requests that scope and understands which account or service will run the job.
Scheduled tasks may run later, at startup, or after a reboot, potentially causing unexpected changes if forgotten.
The guide covers mechanisms that continue or resume execution after reboot or logout. Persistence is central to scheduling, but users should be aware that jobs may keep running after the initial setup.
@reboot /path/to/script.sh # Run once at startup ... Persistent=true ... nohup bash -c "sleep 7200 && /opt/scripts/task.sh" &
Track installed cron entries, systemd timers, and queued at/nohup jobs, and remove or disable them when they are no longer needed.
