Proactive Agent Install
Analysis
This looks like a proactive-memory assistant framework rather than obvious malware, but it asks for broad persistent memory, autonomous checks, account access, local environment changes, and includes a named user's profile/path.
Findings (9)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
When you receive a heartbeat poll ... Things to check: - Emails - urgent unread? - Calendar - upcoming events? - Logs - errors to fix? ... It's been >8h since you said anything
The heartbeat instructions encourage periodic autonomous checks and outreach across private data sources, with unclear scheduling, scope, and user approval boundaries.
Close Unused Apps ... Browser Tab Hygiene ... Close: Random searches ... Desktop Cleanup - Move old screenshots to trash
The heartbeat checklist includes local environment mutations that can close user state or move files, and the checklist itself does not require per-action confirmation.
If `BOOTSTRAP.md` exists, follow it, then delete it.
A workspace file named BOOTSTRAP.md is made authoritative without validation, and deleting it can remove the audit trail of what instructions were followed.
After every mistake or learned lesson: ... Update AGENTS.md, TOOLS.md, or relevant file immediately ... Don't wait for permission to improve.
The skill encourages automatic modification of persistent operating rules, so a bad lesson or poisoned context can affect future sessions.
if [ -d ".credentials" ]; then ... grep -iE "$SECRET_PATTERNS" ... CONFIG_FILE="$HOME/.clawdbot/clawdbot.json"
The included shell script reads local credential metadata and configuration as part of a security audit; this is purpose-aligned and does not show network exfiltration or destructive commands.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
The package has limited provenance metadata, even though it asks users to trust broad persistent-agent behavior.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Things to check periodically: - Emails - anything urgent? - Calendar - upcoming events?
Email and calendar checks imply delegated account access, but the registry declares no primary credential, required environment variables, or account-scope boundaries.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Użytkownik: **Arkadiusz Fudali (makaronz)** ... /Users/arkadiuszfudali/.openclaw/workspace/USER.md
A generic skill package includes a named person's profile details and absolute local workspace path, which is purpose-mismatched and could leak or seed private context into another user's agent memory.
`SESSION-STATE.md` ... Every message with critical details ... Working Buffer — Captures every exchange in the danger zone
The skill directs persistent capture of conversation details, names, preferences, decisions, and exchange summaries without clear retention, exclusion, or sensitivity rules.
