Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Hadoop

v1.0.0

Manage Hadoop clusters with HDFS operations, YARN job tuning, and distributed processing diagnostics.

0· 419·0 current·0 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, and required binaries (hdfs, yarn, hadoop) match the documented capabilities (HDFS operations, YARN job management, diagnostics). No unrelated credentials or tools are requested.
Instruction Scope
Instructions explicitly tell the agent to run administrative hdfs/yarn commands and to read cluster logs/configs (e.g., /var/log, /etc/hadoop/conf). This is appropriate for cluster diagnostics but means the agent will read system-level files and may suggest destructive admin actions (the docs state destructive commands require explicit user confirmation).
Install Mechanism
No install spec or external downloads—instruction-only skill. Nothing is written to disk by an installer other than the skill's own memory files under ~/hadoop/, which is documented.
Credentials
The skill requests no environment variables or credentials. It documents that credentials (Kerberos keytabs) should be managed separately and that it does not store credentials—this is proportionate to its admin role.
Persistence & Privilege
The skill persists state under ~/hadoop/ (memory.md and cluster notes) which is reasonable. It is not always-included and uses normal autonomous invocation defaults; because it can run admin commands, users must confirm destructive actions when prompted.
Assessment
This skill appears coherent for Hadoop administration. If you install it: ensure the agent runs from a host that legitimately has hdfs/yarn/hadoop on PATH and appropriate cluster network access; expect the skill to read /var/log and /etc/hadoop/conf for diagnostics and to create ~/hadoop/ memory files. The docs state that destructive commands (rm -rf, forcible safe-mode leave, datanode data removal, killing apps) will require your explicit confirmation—do not approve destructive operations unless you understand the consequences. Because the skill does not request credentials, continue to manage Kerberos keytabs/tickets yourself. If you need stronger assurances, ask the owner for provenance (who maintains this skill) or run the agent in a sandboxed admin node rather than on an arbitrary workstation.

Like a lobster shell, security has layers — review code before you run it.

latestvk977tbns8zgrjst70h1mnte2zs81tmhe

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🐘 Clawdis
OSLinux · macOS
Binshdfs, yarn, hadoop

Comments