linux-sysadmin

v3.0.2

Linux 系统管理专家 — 覆盖用户权限、SSH、存储、网络、systemd、防火墙、 监控日志、备份恢复、证书TLS、Ansible、容器、IaC 十二大模块。 提供配置→验证→加固→监控→备份→自动化→故障排查→回滚完整闭环。 触发关键词:useradd/sudo/sshd_config/chmod/SEL...

1· 103·0 current·0 all-time
byjoeytao@husttsq
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (Linux sysadmin) align with included artifacts: auditing, backups, cert checks, container and Ansible helpers. The scripts and references correspond to the twelve modules described.
Instruction Scope
SKILL.md directs the agent to run bundled scripts (e.g., bash scripts/system_audit.sh). Those scripts enumerate system state and read local config and state files (/etc/ssh/sshd_config, /etc/passwd, /etc/shadow, ~/.ssh keys, /etc/letsencrypt, /var/run/docker.sock, inventories, backup dirs, etc.). This behavior is expected for a sysadmin tool but is broad and requires root or elevated privileges for some checks; the agent’s outputs may include sensitive information if transmitted.
Install Mechanism
No install spec; the package is instruction-plus-scripts only. No external downloads or third-party installs are performed by the skill itself.
Credentials
The skill does not declare required credentials and requests no external API keys. Scripts accept optional environment variables (e.g., BACKUP_TOOL, BACKUP_DST, BORG_ENCRYPTION, CERT_WARN_DAYS) to configure behavior. However, scripts read sensitive local secrets (private SSH keys paths, /etc/shadow) and the Docker socket; these are proportionate to sysadmin tasks but are high-sensitivity. Ensure the agent is allowed to access such data before running.
Persistence & Privilege
always: false and no special install/write-to-system behavior detected. The skill does not request persistent, elevated platform privileges beyond normal execution; it does not modify other skills or agent-wide settings in the provided materials.
Assessment
This package appears internally consistent with a Linux sysadmin toolkit, but it performs wide-ranging local inspections and will read sensitive files (SSH private keys, /etc/shadow, Docker socket, certificate stores) and may require root to run fully. Before installing or running: (1) review the included scripts line-by-line or run them in a safe/test environment, (2) avoid running as root on production systems unless you trust the source, (3) restrict what outputs the agent may transmit externally (do not send full files containing private keys or /etc/shadow), and (4) if you only need a subset of checks, run individual scripts with least privilege and targeted arguments. The skill’s provenance is unknown (no homepage); exercise normal operational caution.

Like a lobster shell, security has layers — review code before you run it.

latestvk978hvy3gcq11zkewd61xzddbd842cqd

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments