remote-ssh-bridge

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: remote-ssh-bridge Version: 0.1.3 This skill bundle provides basic SSH command templates for interacting with a remote host, as explicitly stated in its purpose. The scripts (`check-sapconet.sh`, `msg-sapconet.sh`) contain clear `TODO` placeholders, requiring the user to configure the `REMOTE_TARGET` and replace placeholder commands. While the direct interpolation of the `MESSAGE` variable in `msg-sapconet.sh` could be a shell injection vulnerability if the `TODO` were replaced with an executing command without proper sanitization, in its current form, the message is safely enclosed within single quotes inside an `echo` command on the remote host. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or prompt injection attempts against the AI agent in the `SKILL.md`.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the script executes a command on the configured remote host; unsafe message text could cause unintended remote shell behavior.

Why it was flagged

The script sends user-provided message text inside a remote shell command over SSH. This is aligned with the SSH bridge purpose, but untrusted text containing shell quotes could change the remote command.

Skill content
MESSAGE="$1"
...
ssh "${REMOTE_TARGET}" "echo 'TODO: send inbox message: ${MESSAGE}'"
Recommendation

Set REMOTE_TARGET explicitly, review the remote command before use, and when replacing the placeholder, pass message content via a safer quoting method or stdin rather than raw shell interpolation.

What this means

The skill can act on the remote machine with whatever access your SSH account has.

Why it was flagged

The skill relies on the user's SSH access to a configured remote host. No credentials are embedded, but commands will run with the permissions of that SSH account.

Skill content
export REMOTE_TARGET="user@<your-remote-host>"
...
Any remote commands require you to configure your own SSH target.
Recommendation

Use a least-privileged SSH account or key, confirm the target host before running, and avoid using production or high-privilege credentials unless intended.