Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

token-use-optimizer

v1.0.0

AI Agent 项目的 Token 消耗审计与系统性优化。提供四层诊断框架、六步优化 SOP、 自动化审计脚本。适用于任何使用 Rules + Memory + Knowledge + Skills 架构的 AI Agent 项目(如 CodeBuddy、Cursor、Windsurf 等)。 This ski...

0· 54·0 current·0 all-time
byLouis Qiu@louisecxqiu-glitch
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description, included audit script (scripts/token_audit.py) and reference docs directly support token auditing and optimization for Rules/Memory/Knowledge architectures; no unrelated binaries, env vars, or external services are requested.
Instruction Scope
SKILL.md instructs the agent/operator to run the included Python audit script against a project root and to follow the provided SOP — this stays within the stated purpose (scanning repo files and producing a report). However, the pre-scan flagged a 'system-prompt-override' pattern in the SKILL.md content; while the visible instructions do not explicitly attempt to change system prompts or exfiltrate data, you should inspect the SKILL.md frontmatter and triggers for any lines that try to override agent/system prompts or execute unexpected actions.
Install Mechanism
No install spec — instruction-only with a bundled Python script. There are no downloads from external URLs and the script uses only standard library modules; risk from installation is low. Executing the included script will run local Python code (review before execution).
Credentials
The skill requests no environment variables, no credentials, and no config paths. The audit script reads local project files (e.g., .codebuddy/rules, knowledge directories, .codebuddy/MEMORY.md) which is appropriate for a token-audit tool.
Persistence & Privilege
Skill is not always-enabled and does not request persistent agent privileges. It does not modify other skill configs or system-wide settings in the provided code or instructions.
Scan Findings in Context
[system-prompt-override] unexpected: A prompt-injection pattern was detected in SKILL.md metadata/triggers. This is not expected for a token-audit skill. The visible SKILL.md does not contain an obvious system-prompt override command, so this may be a false positive from pattern matching on frontmatter or trigger keywords — still recommend manual review of the SKILL.md for any lines that attempt to change system prompts or give the agent elevated instructions.
Assessment
This skill appears coherent: it bundles a Python auditor and documentation that match its stated goal of auditing Rules/Memory/Knowledge token costs. Before installing or running: - Inspect SKILL.md and scripts/token_audit.py yourself (or have a developer do so). The included script reads files under the target project and prints a report — it does not perform network calls in the provided code, but executing arbitrary scripts can be risky. - Run the script on a copy of your project, not on a production workspace containing secrets. The tool will read repository files (including MEMORY.md) and may output their contents or character counts. - Pay attention to the pre-scan 'system-prompt-override' flag: search SKILL.md for any lines that try to change system prompts or inject agent/system-level instructions. If you find such lines, do not run the skill until they are removed or explained. - Execute the script in a restricted environment (non-root user, ephemeral container) the first time to confirm behavior. - If you rely on enterprise security policy, have your security/dev team review the Python file for any unexpected file writes or subprocess/network usage (the provided code appears to use only local file reads and standard libs). If you want higher confidence, provide the exact SKILL.md frontmatter and the full, untruncated portion of scripts/token_audit.py print/report output for a quick line-by-line check.
!
references/optimization-strategies.md:212
Prompt-injection style instruction pattern detected.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk97a8a8zsdcqnfjdjnpr98ettn83kq6n

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments