Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
security-audit-assistant
v1.0.0Conducts lightweight security baseline audits on OpenClaw-managed servers, identifies high-risk SSH/firewall issues, and provides one-click fixes plus compli...
⭐ 0· 48·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description (lightweight security audit for OpenClaw-managed nodes) align with the included checks and the script. The manifest requests node:exec and cron permissions, which are appropriate for running local scans and scheduling.
Instruction Scope
SKILL.md promises 'one-click fixes' and scheduled automated audits; the shipped script only prints CLI fix commands and does not implement safe, opt-in application of fixes. Several provided fix commands are malformed (e.g. sed expressions like 's/PasswordAuthentication yes/no/' and similar), which could corrupt sshd_config or produce unexpected results and risk locking out admins. The instructions do not recommend backups, do not validate changes before restarting sshd, and provide no dry-run safeguards.
Install Mechanism
No install spec or external downloads; this is an instruction-only skill with an included script. Nothing is pulled from external URLs or registries. The HOOK declares only node:exec and system:cron, which is consistent with local execution and scheduling.
Credentials
No environment variables or external credentials requested. The skill requires sudo to perform fixes, which is expected for changing system configuration. There is no evidence of attempts to access unrelated secrets or external endpoints.
Persistence & Privilege
always:false (good). The hook requests system:cron permission which allows scheduling recurring audits—reasonable for this purpose but grants the ability to run commands on a schedule. Agent-autonomous invocation is allowed by default; combined with node:exec and cron this increases blast radius if future versions change behavior.
What to consider before installing
This skill appears to perform the stated local security checks and does not request credentials or external network access, but exercise caution before running on production servers. Specifically:
- Test on a single non-production node first: run the audit in report-only mode (do not apply fixes automatically). Verify the generated recommendations are correct for your OS.
- Do not run the provided fix commands blindly. Several sed replacement expressions in the packaged fixes are malformed and could corrupt sshd_config or other files and potentially lock you out of SSH. Always create a backup of affected config files (e.g., /etc/ssh/sshd_config.bak) before applying fixes.
- Ensure you have console or out-of-band access (serial/console) before applying changes that restart SSH.
- The SKILL.md promises "one-click fixes" but the included script only prints commands; confirm whether the skill will ever execute fixes automatically (review the runtime behavior in your OpenClaw environment). The hook permission node:exec means future updates could add auto-fix behavior—review code after updates and restrict scheduling if you don't want automated remediation.
- Check OS compatibility: some fixes use apt even when centos/rhel are in supported lists. Confirm package manager commands are appropriate for the target OS before applying.
- If you plan to use scheduled audits, review the cron configuration that will be created and ensure reports and any notifications go only where you expect.
If you are not comfortable auditing the code yourself, run this only on staging systems or consult a sysadmin to inspect/patch the fix commands (correct sed patterns, add config backups, validate changes, add dry-run and explicit apply flags).Like a lobster shell, security has layers — review code before you run it.
latestvk972qpjwqha0y9075prkfjrzxd83m1yz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
