MH healthcheck

PassAudited by ClawScan on May 1, 2026.

Overview

This instruction-only host-hardening skill is coherent and approval-oriented, but users should notice that it guides local security inspection and may propose high-impact system changes.

This skill appears suitable for a user-directed security audit. Before installing or using it, be prepared for the agent to inspect local host security settings, and do not approve firewall, SSH, update, or OpenClaw fix actions unless the proposed commands, access impact, and rollback plan are clear.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may inspect local OS, network listening ports, firewall state, backup status, and related security settings.

Why it was flagged

The skill authorizes the agent to run local host-inspection commands after a single read-only permission prompt. This is appropriate for a security audit but still expands the agent's operational reach into local system diagnostics.

Skill content
First ask once for permission to run read-only checks. If granted, run them by default ... Listening ports: ... Firewall status: ... Backups
Recommendation

Grant read-only checks only if you are comfortable sharing local security posture with the agent, and review command output before approving any changes.

What this means

If run with administrator privileges, approved hardening steps could materially change host configuration or access behavior.

Why it was flagged

The workflow includes assessing whether the agent is operating with administrative privileges. That is relevant to host hardening, but admin context can make later actions higher impact.

Skill content
Determine ... Privilege level (root/admin vs user).
Recommendation

Use the least privilege needed for assessment, and only elevate privileges for specific, reviewed remediation steps.

What this means

Firewall or SSH changes could lock out remote users if applied incorrectly.

Why it was flagged

The skill acknowledges that host hardening, especially remote-access changes, can affect availability. The visible instructions include safeguards, making this a managed note rather than a concern.

Skill content
Do not modify remote access settings without confirming how the user connects. Prefer reversible, staged changes with a rollback plan.
Recommendation

Before approving remote-access or firewall changes, confirm your current access method and keep a rollback or console-access plan available.