Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Virtuoso Product Support
v1.0.0Technical support and database management for OpenLink Virtuoso Server with RDF Views generation, SPARQL queries, and comprehensive database operations. Prov...
⭐ 0· 608·0 current·0 all-time
byKingsley Idehen@kidehen
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (Virtuoso support, RDF Views, SPARQL, DB ops) aligns with the runtime instructions: discovery, RDF Views generation, audits, and executing SQL scripts against Demo/URIBurner instances are expected capabilities for this purpose.
Instruction Scope
The SKILL.md instructs the agent to run high-impact operations (generate SQL, then execute it via EXECUTE_SQL_SCRIPT) against production-like instance 'URIBurner' and to perform DSN/linking as an error recovery step. More importantly, the workflow uses tool names such as database_schema_objects and database_remote_datasources in Step 2 error recovery, but those tools are not listed in the skill's declared 'Available MCP Tools' or the provided tool-reference excerpts — calling undefined tools is an incoherence. The skill also instructs the agent to 'remember selection' and retain state across the conversation (stateful behavior) which is expected but increases the need for explicit user confirmation before destructive steps.
Install Mechanism
This is an instruction-only skill with no install spec and no code files. That minimizes disk/write risk; nothing is downloaded or installed by the skill itself.
Credentials
The skill declares no required environment variables or credentials, which is proportionate. However, the troubleshooting docs mention default DB credentials (dba/dba) and the skill expects the ability to execute SQL scripts on production instances — powerful capabilities that require appropriate access controls. No explicit env vars are requested, but executing SQL on URIBurner implies the agent will rely on existing platform tool bindings with potentially elevated DB privileges.
Persistence & Privilege
always:false (good), but the skill instructs autonomous use of high-privilege tools (EXECUTE_SQL_SCRIPT, RDF_AUDIT_METADATA, RDFVIEW_SYNC_TO_PHYSICAL_STORE) against a production instance. Autonomous invocation combined with undefined tools referenced in the workflow increases the blast radius if the platform bindings differ from the documentation or if confirmations are not enforced.
What to consider before installing
This skill appears to be a legitimate Virtuoso support helper, but proceed carefully. Key things to check before installing or using it: 1) Confirm the platform actually exposes the MCP tools the skill expects (especially database_schema_objects and database_remote_datasources referenced in the workflow) — the SKILL.md references tools that are not listed elsewhere, which is an incoherence. 2) Do not allow the agent to run generated scripts on production until you verify the generated SQL and have a current backup; test the full workflow on the Demo instance first. 3) Require explicit, per-action user confirmation for any EXECUTE_SQL_SCRIPT or metadata-repair (RDF_AUDIT_METADATA level 2/3) operations; consider disabling autonomous invocation for destructive actions. 4) Verify credentials and that default passwords (dba/dba) are not in use; restrict DB access to a service account with least privilege. 5) If you can't confirm the tool bindings and provenance (source unknown, no homepage), treat the skill as untrusted for production changes. If you want, I can list the exact tool names referenced in the SKILL.md so you can cross-check them with your platform's available tool bindings.Like a lobster shell, security has layers — review code before you run it.
latestvk976p38gzjtyjjjdmt0c47hn0d81chcy
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
