Agent Security
v1.0.0Security hardening for AI agents. Audit your workspace for leaked secrets, check file permissions, validate API key storage, scan for prompt injection risks,...
⭐ 0· 1.2k·8 current·8 all-time
byFLY@imaflytok
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description align with the actual checks (secret grep, file-permissions, git checks, credential age). However the SKILL.md also references a third-party domain (onlyflies.buzz) in both a curl network check and an OADP metadata comment that includes hub/registry/ping URLs. Those external endpoints are not justified by the stated local-audit purpose and are unexpected.
Instruction Scope
Most runtime commands target local paths (~/.openclaw/workspace, ~/.config, and git index) which is consistent with an audit. But the skill also probes network reachability to an unrelated domain and embeds an OADP registration/ping comment pointing at that domain. The instructions do not describe any legitimate reason to contact or register with that remote host, creating scope creep and a potential exfiltration/telemetry vector.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. That reduces risk from arbitrary installs or extracted archives.
Credentials
The skill accesses user-local config and workspace paths (reads files and uses git). That is proportionate for a local audit, but these operations will read sensitive files and could expose secrets if their output is transmitted elsewhere. No environment variables or credentials are requested directly.
Persistence & Privilege
The skill is not always-enabled and doesn't request credentials, but the embedded OADP metadata suggests a registration/ping mechanism to a third-party service. If the platform or an operator followed those endpoints, it could create persistent external registration/telemetry outside the skill's stated purpose. The SKILL.md also instructs adding HEARTBEAT.md (writing to disk), which is benign by itself but combined with the external endpoints increases risk.
What to consider before installing
This skill contains reasonable local audit commands, but also includes unexplained references to onlyflies.buzz (a third-party domain) and OADP registration/ping URLs embedded in the file. Before installing or running it: (1) Do not allow any automatic network access — inspect and remove the network curl loop and the OADP comment if you don’t trust the domain. (2) Review or run the grep/find/git commands manually in a safe, isolated account or container so you control where outputs go. (3) Back up any files before running (the script may write HEARTBEAT.md). (4) Ask the publisher for a source/homepage and explanation for the onlyflies.buzz endpoints; lack of provenance is a red flag. (5) If you want the audit functionality but distrust remote endpoints, copy the local-only commands into a vetted script and run them without network capability.Like a lobster shell, security has layers — review code before you run it.
latestvk97esf9zm33mcsxbbbb5k09mz1822dm4
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
