OpenServ Agent Sdk
v1.0.5Build and deploy autonomous AI agents using the OpenServ SDK (@openserv-labs/sdk). IMPORTANT - Always read the companion skill openserv-client alongside this...
⭐ 0· 1.1k·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name, description and examples all align: this is an SDK/instruction pack for building OpenServ agents. The guidance to install @openserv-labs/sdk and @openserv-labs/client and to call provision()/run() is coherent with the stated purpose.
Instruction Scope
SKILL.md instructs runtime behaviors beyond just code generation: calling provision() which creates a wallet and writes WALLET_PRIVATE_KEY/OPENSERV_* values into .env, using run() which auto-opens a tunnel to agents-proxy.openserv.ai for dev, delegating LLM calls to the platform, and use of APIs to list/upload/delete workspace files and manage tasks. Those actions are expected for an agent SDK but are security-sensitive (persisting private keys, exposing a local endpoint via a remote tunnel, and sending user inputs to the platform).
Install Mechanism
This is instruction-only (no install spec). The README recommends installing packages via npm (public packages). No archive downloads/extract or custom binary installs are present in the skill bundle itself.
Credentials
The manifest lists no required env vars, but the runtime docs explain that provision() will populate WALLET_PRIVATE_KEY, OPENSERV_API_KEY, and OPENSERV_AUTH_TOKEN and that some features may need OPENAI/ANTHROPIC keys. These environment uses are consistent with the SDK's features, but writing a private key to .env and relying on environment persistence is sensitive — the skill asks for highly privileged secrets only when needed for provisioning/registration.
Persistence & Privilege
Flags show always:false and normal autonomous invocation. The skill's instructions explicitly create and store credentials in the agent's .env (its own config), which is normal for an agent SDK and does not modify other skills or global system settings. Still, persisting WALLET_PRIVATE_KEY to disk is a privileged action and should be managed carefully.
Scan Findings in Context
[system-prompt-override] expected: The SKILL.md and examples set Agent systemPrompt values and explain agent behavior; the scanner's 'system-prompt-override' flag is likely a heuristic match rather than evidence of malicious prompt injection in this context. Still, surface this as an alert because modifying system prompts affects agent behavior.
Assessment
What to consider before installing:
- Trust & provenance: The skill metadata has no homepage and an unknown owner; verify the upstream @openserv-labs packages (npm repo, GitHub repo, checksums, and publisher) before using in production.
- Sensitive keys written to disk: The docs explain that provision() will create a wallet and write WALLET_PRIVATE_KEY into .env. That stores a private key on disk in plaintext by default — accept only if you control the machine and storage. Prefer a dedicated wallet with minimal funds for provisioning and do not reuse a high-value key.
- Auto-tunneling: run() auto-opens a tunnel to agents-proxy.openserv.ai for dev convenience. This exposes a local service endpoint to a remote host. Use DISABLE_TUNNEL=true in production or when you cannot accept an external tunnel.
- Data flow and privacy: Runless capabilities and generate() delegate LLM calls to the OpenServ platform; user inputs and workspace files may be transmitted to the platform. If you process sensitive data, review platform privacy/security policies and consider local LLMs or direct provider calls instead.
- Management & least privilege: Use separate credentials for agent vs. user management (the docs note OPENSERV_API_KEY vs OPENSERV_USER_API_KEY). Fund any on-chain registration wallet minimally and wrap on-chain registration in try/catch as recommended.
- Verify code/packages: Before running npm installs, inspect the actual @openserv-labs/sdk and @openserv-labs/client packages (source, recent changes, dependency tree). The examples here are coherent for an SDK, but you should validate package authenticity and integrity.
If you need more assurance, provide the npm package URLs or the upstream repository so I can check for mismatches between the documentation and actual published package contents.Like a lobster shell, security has layers — review code before you run it.
latestvk97bmffsacz0ysa7wwnmzxwz3h8196wy
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
