Cron 评估器

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill mostly analyzes cron jobs, but it also imports and loads local helper/model files from unreviewed paths in ways that could execute code if those files exist or are replaced.

Review or remove the KAN model-loading pieces before installing. If you use it, run only the basic cron scan on trusted files, avoid unreviewed model checkpoints, and be aware that cron command lines may contain sensitive information.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the v3 analyzer could execute code embedded in a local model file if that file is malicious or replaced.

Why it was flagged

torch.load with weights_only=False can unpickle and execute code from a checkpoint. The model file is referenced but not included in the reviewed manifest, so its provenance is unclear.

Skill content
MODEL_PATH = 'models/cron_kan.pt' ... checkpoint = torch.load(MODEL_PATH, map_location='cpu', weights_only=False)
Recommendation

Use a reviewed model file with a checksum, load only safe state_dict weights, and prefer weights_only=True or another safe serialization format.

What this means

If a file named kan_auto_evolution.py exists at that path, running v2 may execute unreviewed local code unrelated to the packaged skill.

Why it was flagged

The script adds an absolute external directory to Python's module search path and imports a helper that is not present in the skill manifest. Importing that module would run its top-level code.

Skill content
sys.path.insert(0, '/mnt/Morgana')
try:
    from kan_auto_evolution import KANAutoEvolver
Recommendation

Remove the hardcoded external import, bundle and review any required helper, or make it an explicit, pinned dependency.

What this means

Cron entries can reveal private file paths, internal service names, or secrets embedded in command lines.

Why it was flagged

The analyzer reads local crontab data and hardcoded workspace crontab files. This is aligned with cron auditing, but it brings cron command contents into the agent's output.

Skill content
crontab_file = Path(path) / '.openclaw' / 'crontab' ... result = os.popen('crontab -l 2>/dev/null').read()
Recommendation

Run scans only when you are comfortable sharing the displayed cron commands with the agent, and prefer a workspace-specific scan when possible.