Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Code Hug
v1.1.0AI驱动的软件开发工作流编排器,基于六层控制系统提供端到端项目管理能力,包含全面的代码分析、商业智能提取和智能工作流自动化。
⭐ 1· 78·0 current·0 all-time
byroboe@hickhe
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
The name/description (end-to-end code analysis, workflow orchestration, auto-fix) matches the things the SKILL.md asks the agent to do (read project_root, run diagnostics, extract rules, write artifacts, manage sessions). The listed required binaries (python, node, java, git, bash, php) are reasonable for multi-language analysis. Minor inconsistency: the Runtime Dependencies section omits PHP even though php is listed in metadata and PHP is referenced elsewhere; this looks like a documentation oversight rather than malicious misdirection.
Instruction Scope
The instructions expect the agent to read the project's files (project_root), write artifacts to a .code-hug directory, and modify ~/.openclaw/config.json for configuration. These actions are coherent with the skill's purpose but grant the skill broad access to local source trees and the agent config. The SKILL.md does not request external credentials or unexpected network endpoints. It also instructs installing Python packages (pip install), which will modify the environment if executed.
Install Mechanism
There is no install spec and no downloaded code; this is an instruction-only skill. That minimizes installer risk. However, the runtime examples explicitly run pip install which would modify the local Python environment if followed.
Credentials
No environment variables or external credentials are requested, which is proportional for a local code-analysis/orchestration tool. The declared binary requirements are numerous but appropriate for a multi-language analyzer that supports Java, JS/TS, Python, PHP and uses Git.
Persistence & Privilege
The skill is not always-enabled and allows model invocation (normal). It asks the user to add configuration into ~/.openclaw/config.json and will write artifacts to .code-hug/ in the workspace; modifying the agent's config and writing project artifacts is within the claimed scope but increases persistence and impact (agent config edits should be reviewed).
Assessment
This skill appears to do what it says: analyze and orchestrate multi-language projects. Before enabling or running it, consider: 1) Backup ~/.openclaw/config.json before adding the skill's config. 2) Understand that the agent will read your entire project_root and write artifacts to a .code-hug directory—avoid pointing project_root at repositories containing secrets. 3) Review and approve any automatic 'auto_fix' changes (use git to inspect diffs and limit max_fix_attempts). 4) Running the provided pip install commands will change your Python environment—prefer a virtualenv/container if you want isolation. 5) Note the small doc inconsistency around PHP in the runtime deps; verify required runtimes yourself. If you need stronger isolation, run the skill's actions in a sandboxed VM or container and require explicit confirmation before any auto-modification steps.Like a lobster shell, security has layers — review code before you run it.
latestvk976nfz2p0ava39jsdsfj515vs83h0ew
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🤗 Clawdis
OSmacOS · Linux · Windows
Binspython, node, java, git, bash, php
