agent-error-logger-new

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This looks like a coherent local error-log memory skill, with the main cautions being persistent stored logs and manual GitHub publishing credential examples.

This skill appears safe to use for local error logging if you are comfortable with persistent workspace memory. Avoid recording secrets in error logs, review stored logs periodically, verify the real installation source, and do not paste GitHub tokens directly into command-line URLs.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Following the placeholder literally or substituting an unverified repository could lead to installing the wrong code.

Why it was flagged

The manual install instructions point to a placeholder repository rather than a concrete verified source. This is a provenance note, not evidence of malicious runtime behavior.

Skill content
git clone https://github.com/YOUR_USERNAME/agent-error-logger.git
Recommendation

Install only from a verified ClawHub package or a known repository, and update metadata/docs with the real source URL.

What this means

If error logs contain secrets, private task details, or prompt-like instructions, those details may be resurfaced or influence future behavior.

Why it was flagged

The skill intentionally stores long-term error memory and retrieves it before later tasks, so logged content can shape future agent responses.

Skill content
workspace/memory/ ... error-patterns.md # 错误模式索引(长期) ... 主动提醒: 新任务前检索相似错误,提前预警
Recommendation

Keep log entries factual, avoid storing secrets, periodically review/delete old logs, and treat retrieved log content as untrusted context.

What this means

A leaked PAT could allow unwanted GitHub actions within the token's granted scope.

Why it was flagged

The publishing guide shows a GitHub Personal Access Token embedded directly in a command URL, which can expose the token through shell history or process logs.

Skill content
git push https://YOUR_USERNAME:YOUR_PAT@github.com/KoonChaoSo/agent-error-logger.git main
Recommendation

Use GitHub CLI authentication or a credential manager instead of placing tokens directly in command lines; if a token is needed, use a minimally scoped short-lived token.