Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Crabwalk

v0.1.0

Real-time companion monitor for OpenClaw agents

2· 1.9k·15 current·15 all-time
byluccasveg@luccast
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The declared purpose — a real-time monitor for OpenClaw agents — aligns with the instructions (install a Crabwalk binary and connect to the local OpenClaw gateway). However the SKILL.md references reading the OpenClaw config (~/.openclaw/openclaw.json) to auto-detect a gateway token, but the registry metadata did not declare any required config paths or credentials; that mismatch should have been declared.
!
Instruction Scope
The runtime instructions explicitly tell the agent/user to download and extract a release tarball from GitHub, copy a binary into ~/.local/bin, append PATH changes to shell rc files, optionally install system packages using sudo, and start a server bound to 0.0.0.0. The instructions also auto-detect an auth token from ~/.openclaw/openclaw.json. These actions go beyond a purely read-only monitor (they write binaries to disk, change shell startup files, may invoke elevated package installs, and expose a service to the network). Reading the OpenClaw config is consistent with the tool's purpose but should have been declared.
Install Mechanism
Install is via a GitHub Releases tarball (well-known host) and standard extraction to ~/.crabwalk, then copying the binary to ~/.local/bin. Using GitHub releases is common/expected, but extracting and executing an archive obtained at runtime writes arbitrary code to disk — acceptable for a CLI tool but inherently higher-risk than instruction-only skills. The script also attempts to install qrencode with package managers using sudo, which may prompt for elevation.
!
Credentials
The skill declares no required env vars or config paths, yet the CLI/README states it will auto-detect a gateway auth token from ~/.openclaw/openclaw.json. Access to that token is proportional to the stated purpose, but the omission in metadata is an inconsistency. No unrelated third-party credentials are requested.
Persistence & Privilege
The skill does not request always:true and allows user invocation. However the installer writes files to ~/.crabwalk and ~/.local/bin and appends PATH entries to ~/.bashrc/.zshrc, giving it persistent presence in the user environment. The server binds to 0.0.0.0 by default (0.0.0.0:3000), which exposes the monitor to the local network — expected for remote human access but increases attack surface and privacy risk.
What to consider before installing
What to consider before installing: - Metadata mismatch: The skill did not declare that it reads the OpenClaw config (~/.openclaw/openclaw.json) but the instructions say it will auto-detect the gateway token there. Confirm that reading that file is acceptable for your environment. - Binary install from GitHub: The install downloads and extracts a release tarball and places a binary in ~/.local/bin. Although GitHub releases are common, this will execute code on your machine. Verify the project's repo (https://github.com/luccast/crabwalk), review the source or release artifacts, and confirm the release checksum/signature if available. - Persistence and shell modification: The installer appends PATH export lines to your shell rc files. Expect files under ~/.crabwalk and an executable in ~/.local/bin; be prepared to remove them if you uninstall. - Network exposure: Crabwalk defaults to binding 0.0.0.0:3000 and instructs sharing the network IP. That makes the monitor accessible from other machines on your network — fine if intentional, risky if running on a public or untrusted network. Consider firewall rules or binding to localhost with an SSH tunnel if you want restricted access. - Elevated installs: The script optionally uses package managers with sudo to install qrencode. Expect sudo prompts; the rest of the install does not require root. - Safer steps: run the tool in an isolated VM/container or on a non-sensitive host first; inspect the GitHub repository and release artifacts; prefer source builds if possible; backup relevant files and review ~/.bashrc/.zshrc changes after installation. If the author provided explicit metadata (required config path, checksums for releases, or a signed release), my confidence that this is coherent would increase. Without those, treat the skill as plausible but with installation/runtime actions that deserve manual review.

Like a lobster shell, security has layers — review code before you run it.

latestvk977rdpw3b533e4fc66g6mbp4180c03r

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments