Back to skill
Skillv1.0.0
ClawScan security
LightRAG Knowledge Base · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 4, 2026, 10:07 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's instructions reasonably implement a shared knowledge-graph, but the manifest omits several important requirements and the runtime steps ask for broad access to agent files and secrets — review before installing.
- Guidance
- What to consider before installing: - The SKILL.md requires OpenAI/embedding API keys, a LIGHTRAG_API_KEY, and a JWT secret but the registry entry declares none — expect to supply sensitive credentials. Use dedicated, low-privilege/budget-limited keys if possible. - The setup will read and index files from ~/.openclaw (SOUL.md, USER.md, memory/*.md) and symlink scripts into multiple agent workspaces. That gives the service access to potentially sensitive agent profiles and logs; review which files will be indexed and explicitly exclude secrets before indexing. - The Docker image 'lightrag/lightrag:latest' is pulled from Docker Hub; verify the image source (official repo, signed image, or build from audited source) before running in production. - Run initially in an isolated environment (separate VM/container, limited network access) and test indexing behavior and exposed ports. Confirm the service binds to localhost and that no unintended port forwarding or proxying exposes it externally. - Inspect the lightrag_insert/query scripts and any auto-index cron scripts referenced in the README to ensure they don't exfiltrate data or call unexpected endpoints. Search for any third-party endpoints or hardcoded remote hosts. - If you want to proceed: restrict which files are indexed, use separate API keys with usage limits, rotate keys after testing, and consider enabling application-level access controls on the LightRAG instance. - Ask the publisher for a canonical homepage/repo and signed release artifacts so you (or a security reviewer) can audit the Docker image and any code before trusting it.
Review Dimensions
- Purpose & Capability
- concernThe manifest declares no required env vars or config paths, yet the SKILL.md instructs the operator to create a docker .env with OpenAI/embeddings API keys, LIGHTRAG_API_KEY, and JWT_SECRET, and to write/symlink scripts into multiple agent workspaces (~/.openclaw). This mismatch between declared requirements and actual runtime needs is incoherent and surprising.
- Instruction Scope
- concernRuntime instructions tell the agent/operator to read and bulk-index local files (e.g., ~/.openclaw/workspace/SOUL.md, USER.md, and memory/*.md), symlink scripts into many agent workspaces, and set up auto-indexing — actions that access a lot of sensitive agent-local data and grant persistent ability to read new logs. That scope is plausible for a cross-agent knowledge graph but also broad and privacy-sensitive; the skill gives broad discretion to collect/transmit agent data.
- Install Mechanism
- noteThis is instruction-only (no install spec or code files), which minimizes direct repo-supplied code risk. However the instructions pull a Docker image 'lightrag/lightrag:latest' from Docker Hub — the image's provenance and contents are not documented here, so you must trust that image before running it on your systems.
- Credentials
- concernAlthough the registry metadata lists no required credentials, the SKILL.md requires LLM and embedding API keys (e.g., OpenAI-style sk- keys), plus LIGHTRAG_API_KEY and JWT_SECRET_KEY stored in the container .env. These are sensitive credentials and are required for the skill to function; the manifest should have declared them. Centralizing keys in the container increases blast radius if the container or host is compromised.
- Persistence & Privilege
- concernThe deployment runs a persistent Docker container that will continuously serve and index data and the setup instructs adding scripts/symlinks to multiple agent workspaces, producing persistent presence across agents. The skill is not marked always:true, but its setup explicitly modifies other agent workspaces and creates a long-running service — an elevated persistence and access footprint that should be approved explicitly.
