Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Agent Team

v1.0.0

管理和调用具备不同身份和专用模型的多子 Agent 团队,支持任务执行和交互式对话两种模式。

0· 1.6k·13 current·13 all-time
byjohnson@jiangzhiyu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The code and SKILL.md align with the stated purpose: managing per‑agent SOUL.md/configs, listing/showing agents, and spawning/chatting by calling OpenClaw CLI. However, the greetings.py file reaches out to third‑party model endpoints (dashscope.aliyuncs.com) and embeds per‑agent api_key placeholders; this is plausible for a multi‑agent launcher but the implementation contains surprising bits (see environment_proportionality).
!
Instruction Scope
SKILL.md instructions are generally scoped to creating ~/.openclaw/workspace/agents and using the agent CLI. However a pre-scan flagged unicode control characters inside SKILL.md (prompt‑injection pattern), which can be used to obscure or manipulate text. Also the runtime behavior will pass SOUL.md content directly into subprocess calls (system prompts) — expected, but note that malicious or malformed SOUL.md content could influence spawned agents.
Install Mechanism
No install spec is provided (instruction + small scripts only), so nothing will be downloaded or installed by the skill itself. This is lower risk from an install mechanism perspective.
!
Credentials
The registry lists no required env vars, but greetings.py at the end requires DEEPSEEK_API_KEY (and will raise if it's missing). The AGENTS entries use 'api_key': 'TODO_REPLACE_WITH_ENV' and hardcoded base_url values — the mismatch between declared requirements (none) and code behavior (expectation of API keys and calls to external model endpoints) is disproportionate and likely to cause runtime failures or accidental credential exposure if the user sets keys incorrectly. The skill will also send any provided api_key values to dashscope.aliyuncs.com as Bearer tokens.
Persistence & Privilege
always:false and no system‑wide changes are requested. The skill reads/writes only under the user's home workspace (~/.openclaw/workspace) and spawns OpenClaw sessions via subprocesses; it does not alter other skills or request elevated persistence privileges.
Scan Findings in Context
[unicode-control-chars] unexpected: SKILL.md contains unicode control characters flagged as a prompt‑injection pattern. This is not expected for a plain README and could be used to hide or alter visible prompts. Review the raw file for invisible control characters and sanitize before trusting or running the skill.
What to consider before installing
This skill largely implements a local multi‑agent manager and is coherent with that purpose, but there are notable issues you should address before installing or running it: - greetings.py forces the presence of DEEPSEEK_API_KEY at the end of the file and will raise if it's missing; the registry metadata declares no required env vars. Ask the author to declare required environment variables or remove the hard fail. Running the script as-is may crash unexpectedly. - The greetings script contains per‑agent 'api_key' placeholders and will send Bearer tokens to dashscope.aliyuncs.com. Only provide API keys you trust and avoid reusing high‑privilege credentials. Prefer storing keys in environment variables and modify the code to read os.getenv for each agent instead of embedding keys. - SKILL.md was flagged for unicode control characters (possible prompt‑injection). Inspect the SKILL.md and any SOUL.md files for invisible control chars or malicious payloads before using them as system prompts to spawned agents. - The agent spawn/chat functions invoke the local 'openclaw' CLI via subprocess with system prompts built from SOUL.md; malicious or untrusted SOUL.md content can affect downstream agents. Only run agents whose SOUL.md you control or have audited. - If you want to proceed, run the skill in a sandbox or separate account, remove or fix the DEEPSEEK_API_KEY hard check, and replace 'TODO_REPLACE_WITH_ENV' placeholders with secure environment variable lookups. If unsure, request clarifications from the author about required env vars and the intended DashScope integration.

Like a lobster shell, security has layers — review code before you run it.

latestvk973ep2wrf3mqrsxwr4eym7pe9825kwv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments