Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Claw Self Evolution
v1.0.1实现自动发现、记录、隔离实验和审批合并的安全可控AI自我进化闭环,保障系统稳定持续改进。
⭐ 0· 137·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description (self-evolution automation) matches the provided scripts: directory verification, backups, health checks, experiments, introspection. However some requested/performed actions go beyond purely workspace maintenance: service-health-check runs pkill/docker-compose/nohup to restart processes (system-level operations) and weekly scans run pip/list and execute other skills; these are plausible for a maintenance skill but are more privileged than the SKILL.md's repeated 'only touches workspace' claim. Overall capability is coherent but slightly higher privilege than the prose emphasizes.
Instruction Scope
SKILL.md promises strict isolation and mandatory human approval before merging, but the code implements CLI operations that can be invoked to create, modify, and merge experiments programmatically (safe-experiment provides approve_and_merge which will copy experiment files into /app/working). The skill's runtime instructions (cron entries) and scripts assume broad read/write access under /app/working and execute subprocess commands (pkill, docker-compose, pip, custom skill modules). The human-approval model is enforced only by usage conventions (prompt responses/exit codes), not by technical gating; an autonomous agent with permission to invoke the skill could perform merges or restarts without manual intervention.
Install Mechanism
No external install spec (instruction-only plus included install.sh). install.sh only copies bundled Python scripts to /app/working and creates learning files — no remote downloads, no obscure installers. This is low risk from supply-chain perspective, but it writes scripts to disk (expected).
Credentials
The skill declares no environment variables or external credentials and the code does not request secrets. It operates solely on files under /app/working. That is proportionate to its stated purpose. Note: some commands call other local skills or modules (claw-security-suite, get_token_usage) which are assumed present; missing modules won't be able to run but don't imply hidden credential usage.
Persistence & Privilege
The skill is not forced-always, but it can be scheduled (SKILL.md instructs jobs.json cron entries) and its scripts can create/overwrite files under /app/working. Critically, the skill includes programmatic merge functionality (approve_and_merge) that will overwrite workspace files if invoked. The SKILL.md claims 'must be approved' for merges, but that is a policy constraint rather than an enforced technical restriction — because model invocation is allowed by default, an agent could autonomously call the merge CLI. This combination (ability to modify workspace + no technical enforcement of approval + normal platform autonomous invocation) increases risk and should be considered carefully.
scan_findings_in_context
Like a lobster shell, security has layers — review code before you run it.
latestvk970ez0390nnf6eyb0nby65kts8344r9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
