SysClaw Reporting
Analysis
The skill appears to perform its stated SysClaw reporting role, but it gives agents a broad database-backed channel for high-impact system requests and persistent cross-agent notifications without clear identity, approval, or memory-safety boundaries.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
request anything from SysClaw including software installation, resource access, configuration changes, service management, deployments... Actions: `install` | `remove` | `create` | `modify` | `restart` | `grant` | `check` | `deploy`
The skill invites agents to submit requests for broad, high-impact system operations, but the artifacts do not define target limits or require user approval before an agent submits those requests.
(crontab -l 2>/dev/null; echo "*/15 * * * * /usr/local/bin/check-sysclaw-notifications.sh") | crontab -
The cron job is user-directed and purpose-aligned, but it creates recurring background activity that continues after the immediate task.
Required env vars: none ... No install spec — this is an instruction-only skill ... Registry metadata: Version: 4.0.0
The registry metadata under-declares the required Python dependency and database environment variables, and the included _meta.json lists version 3.2.0 rather than the registry's 4.0.0.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
agent_name="${1:?Usage: check-notifications.sh <agent_name> [mark_read]}" ... WHERE recipient = %s AND read = FALSE ... UPDATE notifications SET read = TRUE WHERE recipient = %s AND read = FALSEThe notification script uses a caller-supplied agent name to read and mark notifications; the artifacts do not show binding between the database credential and the claimed agent identity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
source="${1:?Usage: request-resource.sh <source> <type> <action> <target> <justification> [urgency] [payload] [source_host]}" ... INSERT INTO notifications (recipient, sender, related_request, message, urgency) VALUES (%s, %s, %s, %s, %s)The sender identity is supplied as a free-form argument and written into the shared notifications table; the artifacts do not show authentication, sender verification, or origin validation for cross-agent messages.
bash "<skill-path>/scripts/check-notifications.sh" <your-agent-name> > "<workspace>/memory/notifications.md" ... Then at session start: `cat memory/notifications.md`
The skill recommends storing external cross-agent notification text in a persistent memory file and loading it at session start, which can make untrusted messages part of future agent context.
