Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Value & Environment Validator
v1.0.0Value validation and environment detection tool for Shell scripts. Validates input types (integers, floats, IPs), compares file ages, detects runtime environ...
⭐ 0· 44·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The described purpose (shell value/environment validation) is plausible, but the package contains no code or install instructions. Instead it instructs users/agents to '. ~/.x-cmd.root/X' to load x-cmd. A coherent skill would either include the script or provide an official install method or clear provenance for that file.
Instruction Scope
Runtime instructions require sourcing a file in the user's home (~/.x-cmd.root/X). Sourcing an arbitrary user-owned file can execute arbitrary code and access local secrets/files; this behavior is outside the declared requirements and not justified by the metadata. The rest of the instructions (type checks, file-age checks, environment detection) are consistent with the stated purpose, but the explicit instruction to load a hidden local file is a scope creep and a potential execution/data exposure vector.
Install Mechanism
There is no install spec and no code files. While instruction-only skills are low-risk in principle, this one cannot function without external code (the ~/.x-cmd.root/X file). The absence of an install or bundled implementation is an incoherence: the skill promises commands but supplies no implementation or safe retrieval mechanism.
Credentials
The skill declares no environment variables or credentials (which is appropriate), but the instruction to source a specific path in the user's home effectively requests access to user filesystem content. That can expose sensitive files or run arbitrary code; the SKILL.md does not justify or constrain this access.
Persistence & Privilege
The skill does not request persistent/always-on presence and uses the platform default for autonomous invocation. It does not declare writes to system config or other skills' settings. Autonomous invocation alone is not flagged, and 'always' is false.
What to consider before installing
This skill is suspicious because it provides no code but tells the agent to source ~/.x-cmd.root/X, which could execute arbitrary code or read files from your home. Before installing or using it: (1) Do not source ~/.x-cmd.root/X unless you trust its origin — inspect its contents first. (2) Ask the publisher to include the implementation or a verifiable install method (official package URL, checksum, or GitHub release). (3) Prefer running this in an isolated environment if you want to test. (4) If you only need the described validations, consider using a known, auditable script or a packaged tool rather than sourcing a hidden file. If the publisher provides the script content (or an install URL on a reputable host) and a checksum, the coherence concerns would be resolved.Like a lobster shell, security has layers — review code before you run it.
latestvk97e488cn6zc14w73fge8cfzph83q1hb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
