Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

System Monitor

v1.3.0

Monitor system health on the gateway host (Raspberry Pi / ARM / Linux). Reports CPU, RAM, disk, temperature, uptime, load, top processes. Can check alert thr...

0· 57·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Crypto
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description match the code: it reads /proc, /sys, calls ps and df, and reports CPU, RAM, disk, temp, uptime and top processes. This behavior is expected for a system-monitor. Minor inconsistency: the SKILL.md header mentions vcgencmd but the script does not call it.
Instruction Scope
Runtime instructions are local and read-only; the script does not perform network calls or require external services. However the SKILL.md claims 'Safe in groups: Output contains no sensitive paths, tokens, or user data' — the script does include mount points and truncated process command lines which can contain sensitive info. The script attempts to sanitize common token/key patterns, but that redaction is pattern-based and not exhaustive.
Install Mechanism
No install spec (instruction-only with an included script). Nothing is downloaded or written by an installer.
!
Credentials
Metadata declared 'Required config paths: none', but the script reads a per-user config at ~/.config/system-monitor/config.json to load thresholds. No env vars or credentials are requested. Reading a user config folder is reasonable for thresholds, but the mismatch between metadata and actual config access should be noted.
Persistence & Privilege
always is false and the skill does not modify other skills or system settings. It only reads system state and a single per-user config file.
What to consider before installing
This skill appears to do what it says (local system health checks), but review these before installing: - The script reads ~/.config/system-monitor/config.json (not declared in metadata). Inspect that file's contents/permissions if it exists. - Process command lines are reported (sanitized for common token patterns), but the redaction is pattern-based and can miss secrets passed as positional arguments or stored in environment variables. If you run this on hosts with sensitive command-line arguments, consider restricting its use or limiting --top output. - The SKILL.md claims 'no sensitive output' — treat that as optimistic. Expect mount points and trimmed commands in outputs. - The script is local and read-only (no network), and there is no installer. If you need stronger guarantees, run it in a non-sensitive account or inspect/modify the code to suit your security policy. If you want me to, I can suggest small code changes to harden redaction or to avoid reading the config file by default.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dt95zrasgp1synk9tr37j3984ahff

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments