Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

UniFi Network

v1.0.0

Read-only access to UniFi Network data for device inventory, network config, client info, alerts, health status, and topology export.

0· 29·0 current·0 all-time
byMorten Bojer@mbojer
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name and description (read-only UniFi Network access) align with the included scripts: all network inventory/health/clients/topology scripts use only GETs against the UniFi API. However the registry metadata declares no required env vars or binaries, but the SKILL.md and scripts require UNIFI_URL/UNIFI_API_KEY (or a config file) and runtime binaries (curl, jq). That metadata omission is an incoherence and should be corrected.
Instruction Scope
Runtime instructions and scripts stay within the stated purpose: they only call UniFi API endpoints, read a local config (~/.clawdbot/credentials/unifi/config.json) for URL and API key, and write/read cache under ~/.clawdbot/cache/unifi/. Scripts are explicit about which endpoints are used and include a setup_test to validate endpoints. They do not attempt to read other system config or unrelated credentials.
Install Mechanism
There is no install spec (no external downloads). All code is included in the package and scripts are executed directly. This is lower risk than remote installers; nothing in the files downloads arbitrary code from unknown hosts.
!
Credentials
The skill legitimately needs an API key and base URL (UNIFI_API_KEY, UNIFI_URL, optional UNIFI_SITE or config file). Those are appropriate and scoped to UniFi read-only access. The concern is that the registry metadata did not declare these required credentials or the primaryEnv, which is misleading. The skill writes raw API responses to local cache files (may contain sensitive information) and expects the user to create a config file containing the API key; the SKILL.md suggests chmod 600, which is good practice.
Persistence & Privilege
The skill persists data in ~/.clawdbot/cache/unifi/ and expects a credentials file at ~/.clawdbot/credentials/unifi/config.json. This is limited to its own directory (no system-wide changes) and always:false. Caching is intentional for efficiency but means API responses (including potentially sensitive device/client data) are stored on disk; the cache and config file locations are mutable via UNIFI_CONFIG_FILE and HOME.
What to consider before installing
What to check before installing: - Metadata mismatch: the package metadata lists no required env vars/binaries, but the scripts need UNIFI_URL and UNIFI_API_KEY (or a config file) and the binaries curl and jq. Don't rely solely on the registry metadata—follow SKILL.md. - Secrets: supply a read-only UniFi API key and keep it limited to Network read scope. The skill stores that key in ~/.clawdbot/credentials/unifi/config.json (SKILL.md recommends chmod 600) and caches API responses in ~/.clawdbot/cache/unifi/; secure those files and consider filesystem backups/rotations. - UNIFI_URL safety: ensure UNIFI_URL points to your trusted UniFi host (typically an internal host). If an attacker can control that URL, they could receive API requests/responses. The skill will send your API key to whatever UNIFI_URL you configure. - Autonomy: the skill is allowed to be invoked by the agent (normal). If you are concerned about autonomous access to network inventory data, consider disabling autonomous invocation for this skill or restricting when it can be used. - Verify binaries: ensure curl and jq are present in the runtime environment; run scripts/setup_test.sh to validate connectivity and endpoint shapes before regular use. - If you need stronger guarantees: ask the publisher to correct registry metadata to declare required env vars and primaryEnv (UNIFI_API_KEY), and to document the cache/content retention policy. If you cannot verify the publisher, review the included scripts yourself (they are readable) or run them in a controlled environment first.

Like a lobster shell, security has layers — review code before you run it.

latestvk9785nm0b1hy0vg9cxxe10vwan844y9k

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments