Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Lobster Agent

v1.0.0

服务器监控Agent,自动采集系统指标并上报到Coze大龙虾平台,支持CPU/内存/磁盘/网络监控、告警推送和自动节点注册。

0· 103·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The SKILL.md describes installing a systemd-backed monitoring agent (requires root, Python3, pip3, curl, network access to https://api.coze.cn). The registry metadata lists no required binaries, no env vars, and no install source. That mismatch suggests the declared capabilities/requirements do not match what the skill will actually do.
!
Instruction Scope
Runtime instructions say the agent will create /opt/lobster-agent, /var/log/lobster-agent, /usr/local/bin/lobster, and an /etc/systemd/system service, auto-register the node and send metrics/alerts to Coze. The SKILL.md provides no concrete, auditable install script or source for the agent binary; it authorizes collection and external transmission of host metrics, which is sensitive. Instructions do not reference unrelated files, but they do permit broad actions on the host.
!
Install Mechanism
There is no install spec and no code files — yet the doc claims the agent program will be generated/installed. Because there is no declared source (no URL, repo, or packaged artifact), it's unclear where executable code would come from. That absence increases risk: installation might require downloading unspecified code or generating it dynamically.
!
Credentials
The skill will store an api_key and other config under /opt/lobster-agent/config.json and requires root to install, but the registry metadata lists no required credentials or config paths. Requesting root and sending host metrics to an external service is a privileged operation; the lack of declared env/config requirements is incoherent and hides needed secrets (Coze API key).
!
Persistence & Privilege
The agent is designed to install a systemd service that runs on boot and restarts on crash (persistent, privileged presence). The skill metadata does not declare this persistence. The skill is user-invocable and can be invoked autonomously by the model (platform default); combined with service persistence and network exfiltration, that increases potential impact if the code or remote endpoint are untrusted.
What to consider before installing
Do not install this on production or sensitive hosts until you verify provenance. Key questions to ask the publisher: Where is the agent source code or release artifact (GitHub/official domain)? Can you provide checksums/signatures for binaries? Provide an install spec that explicitly downloads a named release from a trusted URL, or supply the full install script for audit. Confirm exactly what host data is sent to https://api.coze.cn and how API keys are stored/encrypted. If you need to test, run inside an isolated VM or container with no sensitive data and restricted network access. If you cannot get a trustworthy source and verifiable install artifacts, treat this skill as risky.

Like a lobster shell, security has layers — review code before you run it.

latestvk9776nska8c8wvb8rmy99t0kg1836hee

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments