skillhub-auto-installer

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may trust the skill as read-only and overlook scripts that can change the local agent environment.

Why it was flagged

The documentation makes strong search-only and no-risk claims, but other supplied files include installation and local security-scanning scripts. This under-discloses the package's effective capabilities.

Skill content
此技能 **仅提供搜索功能**
- **不执行安装**、不访问本地文件系统、不读取本地配置
...
- 此技能 **仅搜索**,无安全风险
Recommendation

Remove the installer/audit scripts or clearly disclose them in SKILL.md and metadata, with explicit user approval requirements.

What this means

Running this script can add persistent new capabilities or code to the user's agent environment.

Why it was flagged

This installs a user-specified remote skill into the OpenClaw workspace with automatic confirmation/copy flags, which is a high-impact mutation rather than read-only search.

Skill content
cd /home/gem/workspace/agent
SKILLS_API_URL=https://skills.volces.com/v1 npx -y skills add "$URL" -s "$SKILL_NAME" -a openclaw -y --copy
Recommendation

Do not run the installer scripts unless you intentionally want installation behavior; require explicit confirmation and review of the target skill before any `skills add` command.

What this means

A remote or mistaken skill source could be installed into the agent environment under the appearance of a search helper.

Why it was flagged

The script pulls remote skill content via an unpinned `npx` CLI and a URL derived from user-provided owner/repo input, creating a supply-chain installation path that is not disclosed by the search-only description.

Skill content
URL="https://skills.volces.com/skills/$OWNER/$REPO"

cd /home/gem/workspace/agent
SKILLS_API_URL=https://skills.volces.com/v1 npx -y skills add "$URL" -s "$SKILL_NAME" -a openclaw -y --copy
Recommendation

Pin tool versions, verify remote skill provenance, and make installation a separate, clearly disclosed workflow with manual review.

What this means

Invoking the checking workflow can run local code outside the advertised search-only behavior.

Why it was flagged

This executes another installed skill's audit script, contradicting the SKILL.md statement that this skill does not run security audits.

Skill content
if [ -f "$SKILLSENTRY_PATH/scripts/audit.sh" ]; then
    bash "$SKILLSENTRY_PATH/scripts/audit.sh" 2>/dev/null || true
Recommendation

Disclose this execution path clearly, and only run local audit scripts after the user understands which installed skill's code will execute.