Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
toolguard-daemon-control
v0.0.1Manage macOS launchd user agents to start, stop, restart, check status, and access logs of persistent background services without sudo.
⭐ 0· 695·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description describe managing macOS launchd user agents; the included scripts implement install, uninstall, status, list, and log viewing by writing plists under ~/Library/LaunchAgents and logs under ~/Library/Logs/toolguard/. All required actions and files are consistent with that purpose.
Instruction Scope
Scripts only touch user LaunchAgents and a user log directory and call system tools (launchctl, tail, which, mkdir, rm). They allow installing arbitrary executables as services and accept --env KEY=VALUE pairs which are written into the plist. The scripts do not read unrelated system files or external network endpoints. Caution: values are embedded into XML without explicit escaping (EnvironmentVariables and ProgramArguments are inserted directly), and installed services will persist and run arbitrary binaries — so you must trust the command and any environment values you pass.
Install Mechanism
No external install or network downloads; this is an instruction-only skill with bundled shell scripts. Nothing is fetched from third-party URLs or registries.
Credentials
The skill declares no required env vars or credentials. However, install.sh accepts user-supplied --env pairs and writes them into the plist (persisted in ~/Library/LaunchAgents). Passing secrets or tokens will store them in a file under your home directory and may expose them to other processes that can read your user files. Logs may also capture sensitive output.
Persistence & Privilege
The tool intentionally creates persistent user-level launchd agents (KeepAlive=true, RunAtLoad=true). The skill itself is not marked always:true, but if invoked (including autonomously by an agent) it can install services that survive reboots. This persistent capability is expected for the stated purpose but increases impact if used without supervision.
Assessment
This skill appears to do exactly what it says: create and manage user-level launchd agents. Before using or allowing autonomous invocation, verify the exact command you will install and avoid passing secrets via --env (they are persisted in the plist). Prefer pointing to compiled binaries or wrapper scripts you control (not transient tools like 'go run'). Review created plist files in ~/Library/LaunchAgents and logs in ~/Library/Logs/toolguard/, and uninstall any service you don't recognize. Note: the scripts embed provided values directly into plist XML without escaping — avoid passing untrusted input that could break the plist or introduce unexpected entries.Like a lobster shell, security has layers — review code before you run it.
latestvk97a3d1948zp83j1d5e5rs0nfn815wrglatest daemon plist macosvk97a3d1948zp83j1d5e5rs0nfn815wrg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
