Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
File Sender
v2.1.0Find and send local files to a chat channel (Telegram, Discord, WhatsApp, Signal, Slack). Also manages encrypted credential files with age encryption. Use wh...
⭐ 0· 104·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name and description (send local files + manage encrypted credentials) align with the included scripts and SKILL.md. The code uses openclaw for message delivery and age for encryption as described; no unrelated cloud credentials or external services are requested.
Instruction Scope
SKILL.md instructs broad filesystem searches (e.g. find / ...) and to 'send any file' when the owner (Marco) requests it, explicitly telling the agent not to refuse sensitive documents. That grants the agent wide discretion to access sensitive local files and to ignore normal safety checks; identity verification is left to informal rules. This makes the runtime behavior dangerous if identity is spoofed or the agent misclassifies context.
Install Mechanism
No install spec — the skill is instruction-plus-scripts and relies on locally-installed age and openclaw. No downloads from untrusted URLs or extract operations are present in the bundle.
Credentials
The skill requests no external credentials or env vars, and all file access is local (home dirs, ~/.openclaw/workspace). It will create a private key at ~/.local/share/local-rag/cred-key.txt and a credential store at ~/Documenti/credentials; these filesystem accesses are proportional to the stated functionality but grant the skill access to many local files.
Persistence & Privilege
always:false (no forced global enable). The skill will create persistent files (keypair and encrypted store) in the user's home; this is expected but worth noting because those artifacts grant ongoing capability to decrypt/send credentials if the key is present.
What to consider before installing
Before installing:
- Review and accept the policy tradeoff: SKILL.md explicitly tells the agent to send any file the named owner requests (including IDs, keys, certificates) without refusing — this is intentional but risky. Consider whether you want an agent that will unconditionally send sensitive local files.
- Identity and authorization: ensure the agent actually verifies the requestor’s identity in practice; the skill's instructions rely on informal owner context ("Marco") rather than enforced authentication.
- Verify openclaw and age: the scripts invoke the openclaw CLI and age/age-keygen. Confirm those tools are legitimate, present, and configured correctly (their auth controls the outbound channels). The skill itself does not implement transports — it calls your OpenClaw client.
- Audit on-disk artifacts: the key is created at ~/.local/share/local-rag/cred-key.txt and encrypted files live in ~/Documenti/credentials/. If an attacker can read the private key file, encrypted credentials can be decrypted. Protect and rotate that key if needed.
- Secure-delete caveat: secure_delete implements multi-pass overwrites, which is not guaranteed on modern SSDs or filesystems. Treat it as best-effort and avoid assuming irrecoverability.
- Reduce blast radius: if you proceed, limit the agent’s filesystem search scope (avoid running find /; restrict to specific directories), run in a contained environment, and test sending only non-sensitive files first.
- Code review and testing: inspect and run the scripts in a safe environment. Confirm openclaw send behavior and logging, and that the skill does not leak data to unexpected endpoints.
Given these findings, the skill is coherent with its stated purpose but contains explicit instructions to bypass normal safety checks; proceed only after confirming identity/authentication and protecting the encryption key and workspace.Like a lobster shell, security has layers — review code before you run it.
latestvk97dtk5w68ef5j0whdtsrz0bxx8495rp
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
