Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Remind Me 2.1.0
v1.0.0Set reminders using natural language. Automatically creates one-time cron jobs and logs to markdown.
⭐ 0· 1.8k·16 current·17 all-time
byLougazi@loui1979
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The description says it creates cron jobs and logs to markdown, which aligns with some files, but the scripts depend on a local project (cd /home/julian/clawdbot) and run 'npx tsx src/index.ts cron add' to create jobs and deliver messages via Telegram to a hardcoded recipient. The manifest declared only 'bash' and 'date' as required binaries; 'npx', 'tsx', and 'jq' are required by the scripts but not declared. Requiring a local Clawdbot repo and an external delivery channel is beyond the simple "cron + markdown" description and is not justified in the metadata.
Instruction Scope
SKILL.md instructs the agent to run the included scripts which read/write /home/julian/clawd/reminders.md and invoke the Clawdbot CLI (via npx) to deliver messages over Telegram to a fixed id (6636746252). The check-reminders.sh script expects unchecked items formatted as '- [ ] ...' and marks them '[x]', but create-reminder.sh and create-recurring.sh log entries as '- [scheduled]' and '- [recurring]', so the check script will not detect or mark those entries—an operational inconsistency. The scripts thus (a) modify user files in a hardcoded home path, (b) invoke a local JS tool with network/external-delivery side effects, and (c) will likely not work as intended due to inconsistent log formats.
Install Mechanism
There is no declared install spec (instruction-only), which is lower risk in isolation. However, the bundled scripts assume a node/npm environment ('npx', 'tsx') and 'jq' are available and that a local project exists at /home/julian/clawdbot. Those implicit dependencies increase runtime risk because arbitrary JavaScript code will be executed via npx from that repo (or will fail if absent).
Credentials
The skill declares no required environment variables or credentials but calls into a local Clawdbot command that delivers messages to Telegram (--channel telegram --to 6636746252). That implies the Clawdbot project must have credentials/config for delivery; those secrets are not declared. The hardcoded recipient ID means reminder content will be sent to a fixed external target (possible data leakage). No justification is provided for these credentials/targets in the SKILL.md.
Persistence & Privilege
always:false (normal) and the skill does not request system-wide privileges or modify other skills. It does, however, write to and edit a hardcoded file path (/home/julian/clawd/reminders.md) and assumes a particular user's directory layout; this limit of scope reduces broad privilege but makes the skill brittle and user-specific.
What to consider before installing
Do not install blindly. Key concerns: (1) The scripts call 'npx tsx' in /home/julian/clawdbot and will execute code from that repo (or fail) — ensure you control and inspect that project. (2) Reminders are delivered via Telegram to a hardcoded recipient (6636746252) — this will send reminder text externally and could leak sensitive info; confirm the recipient is intended. (3) The code requires undeclared tools ('npx', 'tsx', 'jq') and uses a hardcoded home path (/home/julian) making it user-specific. (4) There is an inconsistency: check-reminders.sh looks for '- [ ]' items, but create-* scripts log '- [scheduled]'/'- [recurring]', so automatic delivery may not work as written. Actions to consider before proceeding: ask the publisher to explain the Telegram target and provide required environment/dependency documentation; run the scripts in a safe isolated test user account after installing and inspect the local /home/julian/clawdbot code; or reject the skill until these inconsistencies and undeclared external deliveries are resolved.Like a lobster shell, security has layers — review code before you run it.
latestvk97bt85c5gxdszctxxca13rnnx821x2t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
⏰ Clawdis
Binsbash, date
