Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
tvs-cc-migrator
v1.0.0Claude Code 配置迁移工具。备份和恢复 ~/.claude/ 下的所有配置(CLAUDE.md、rules、skills、commands、agents、自定义插件、settings.json 等)。当用户提到备份配置、迁移 Claude Code、导出设置、恢复配置、换电脑等场景时使用此 skill。
⭐ 0· 64·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match what the artifact does: the script scans, packages, and produces a manifest for ~/.claude/ content (CLAUDE.md, rules, skills, commands, agents, plugins, settings.json, etc.). No unrelated credentials, binaries, or external services are requested.
Instruction Scope
SKILL.md instructs the agent to run the included Node script to scan and optionally pack files under ~/.claude/ and to use the manifest for guided restore. All file reads/writes are scoped to the Claude home directory; the instructions explicitly require user confirmation before including sensitive fields and do not direct data to external endpoints.
Install Mechanism
There is no install spec; the skill is instruction-only with an included script (scripts/backup.mjs) that the user is expected to run with Node. No external downloads or package installs are requested by the skill itself.
Credentials
The skill does not request environment variables or external credentials, which is proportionate. It does read settings.json and will detect and optionally include values that look like tokens/keys; this is expected for a backup tool but is a privacy/security consideration — the manifest will include source_machine/source_user and flags showing which sensitive fields had values.
Persistence & Privilege
The skill is not always-enabled and does not request persistent platform privileges. It does not modify other skills or global agent configuration; restore is intended to be a user-driven process guided by Claude, not an automatic remote operation.
Assessment
This skill appears to do what it claims, but review and act cautiously:
- The backup script reads ~/.claude/ and will detect settings.json tokens/keys. If you choose to keep sensitive values in the backup, the resulting archive will contain secrets that could be abused if leaked. Prefer the option that clears sensitive fields unless you accept the risk.
- The manifest includes source_machine and source_user (hostname and username); be aware this exposes identifying metadata in the backup.
- The included script imports child_process.execSync (likely for zipping or platform commands). Before running, skim scripts/backup.mjs to confirm no unexpected commands are executed automatically; the SKILL.md indicates the script only scans and packages locally, but verify the implementation if you have security concerns.
- Keep backup archives encrypted and transfer them via trusted channels. When restoring on a new machine, verify the manifest and contents before applying or executing any reinstall commands listed in the package.
If you want higher assurance, run the script on a disposable machine or inspect it line-by-line to confirm it does only local file operations and zipping.scripts/backup.mjs:602
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk972ft2jz10rww5tq77nf2cdzd845f2x
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
