Sysadmin
v1.0.0Manage Linux servers with user administration, process control, storage, and system maintenance.
⭐ 3· 2.5k·18 current·19 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the SKILL.md content: guidance on user management, processes, storage, logs, networking, backups, and package management. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
SKILL.md contains direct system administration commands and references to system paths (e.g., /var/log, /etc/hosts, chattr). This is expected for a sysadmin skill, but these are powerful operations that change system state; ensure the agent is only allowed to act where you intend (prefer manual invocation on production systems).
Install Mechanism
No install spec or code files — instruction-only skill. Lowest-risk install posture (nothing is written to disk by an installer).
Credentials
Requires no environment variables, credentials, or config paths. Requested access is proportional to the stated purpose.
Persistence & Privilege
always:false and default autonomous invocation settings are normal. The skill does not request permanent presence or modify other skills or system-wide agent settings.
Assessment
This skill is internally consistent with a system-administration helper and does not ask for credentials or install code. However, the guidance includes commands that can modify or damage systems if run incorrectly. Before installing or enabling autonomous invocation: (1) Prefer manual invocation for production servers; (2) Test the skill's suggestions in a sandbox VM; (3) Limit the agent's permissions to non-production or restricted accounts; (4) Ask the publisher for source/origin if you need provenance — the package source is listed as unknown. If you want the agent to act automatically, enforce least privilege and monitoring so any destructive actions are contained.Like a lobster shell, security has layers — review code before you run it.
latestvk979ypnksf389ez57jb6tmz6ns80xk8q
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🖥️ Clawdis
OSLinux · macOS
