Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

server-log-analysis

v1.0.0

通过 SSH 连接远程服务器,读取同级 config.yaml 理解服务信息与日志位置,按需下载相关日志片段到本地 temp 目录,并分析日志定位问题。适用于用户要求排查远程服务日志、分析服务端异常或基于 SSH 访问进行日志诊断的场景。

0· 134·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's stated purpose (SSH into remote servers, discover log paths from a local config, download minimal log fragments, analyze them) aligns with the instructions. However the included config.yaml contains an inline connection entry (username: root, password: password), which contradicts the SKILL.md and reference.md guidance that passwords/private keys should not be stored in plaintext in config.yaml.
Instruction Scope
SKILL.md explicitly directs the agent to read config.yaml, connect via SSH to remote hosts, perform remote checks, and download log fragments to a local temp directory—this is within the declared purpose. The instructions do not attempt to modify remote systems (they explicitly say not to), but they do permit downloading potentially sensitive logs and instruct the agent to read the local config file which may contain credentials. That read is expected for the task but increases sensitivity.
Install Mechanism
Instruction-only skill with no install spec or code files to execute; nothing is written to disk by an installer. This is the lowest install risk.
!
Credentials
The skill declares no required environment variables but recommends using environment variables / key files for SSH credentials. The provided config.yaml nevertheless includes plaintext credentials (connections.default-server.username = 'root', connections.default-server.password = 'password'), which is disproportionate and risky. Also config defaults (preserve_downloads: true, local_temp_dir) mean downloaded logs may be kept locally unless altered.
Persistence & Privilege
always: false and no install hooks or code that modify other skills or agent-wide settings. The skill does create/expect a local temp dir for downloads, which is reasonable for its purpose.
What to consider before installing
This skill appears to do what it says (SSH -> read config.yaml -> fetch logs -> analyze), but review and harden before use. What to check before installing or running: - Inspect config.yaml immediately. It contains a connection example with username: 'root' and password: 'password'. Replace any plaintext passwords with references to environment variables or a secrets manager, or remove the credentials entirely. - Prefer SSH key-based auth and point the skill at a non-root, least-privilege account. Ensure SKILL.md's suggested auth mechanism (env var or key file) is actually used instead of embedded secrets. - Confirm local_temp_dir and preserve_downloads behavior. If you don't want logs persisted, set preserve_downloads: false and ensure temp/ is cleared after analysis. - Limit scope in config.yaml (allowed hosts, explicit log paths) so the agent cannot be pointed at arbitrary files/hosts. Use explicit allowlists where possible. - Validate who published this skill (source unknown, no homepage). If you cannot verify the author, avoid giving it broad SSH access to production systems. - Consider running manual, audited SSH commands yourself for sensitive systems rather than allowing an automated agent to fetch logs until you trust the skill and configuration. Why the verdict is 'suspicious': the skill is coherent, but the bundled configuration includes insecure defaults and sensitive information in plaintext; that mismatch with the documentation and the potential to download sensitive logs raise concern. Additional information that would raise confidence to 'high': a cleaned config.yaml without plaintext secrets, clear runtime control over which hosts/files can be accessed, and provenance of the skill (trusted publisher or repo).

Like a lobster shell, security has layers — review code before you run it.

latestvk974j0v0r9943mnr3d0kmsqxcn838n8r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments