Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
superviser ressources
v1.0.0Superviseur automatique surveillant CPU, RAM, Docker, et sites, avec redémarrage automatique des services en panne.
⭐ 0· 449·0 current·0 all-time
byMarouane@mrnsmh
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill description and SKILL.md promise periodic scanning every 5 minutes and automatic restart ('auto-guérison', '/supervisor restart'), but monitor.py only runs a single status snapshot (resources, HTTP checks, docker ps) and contains no scheduling or restart logic. The code also probes three hardcoded external domains unrelated to the user's host, which is unexpected for a local supervisor.
Instruction Scope
SKILL.md instructs the agent to scan every 5 minutes and attempt auto-healing. Those are high-privilege actions (restarting services/containers) but there are no concrete, scoped commands or safeguards in the instructions or code. The agent would be given broad discretion to perform restarts without prescriptions of which commands to run, required privileges, or rollback behavior.
Install Mechanism
There is no install spec. The code imports third-party Python packages (requests, psutil) and calls the 'docker' CLI but the skill declares no dependencies or required binaries. That mismatch will cause runtime errors or hide implicit installation/privilege requirements.
Credentials
No environment variables or credentials are requested (ok), but the code performs outbound HTTP GETs to three hardcoded external domains (aiflowhub.online, prospectx.aiflowhub.online, marocpromo.insightops.online). A supervisor for a user's server would normally check local services or user-configured targets — contacting specific third-party sites by default is unexpected and should be justified by the author.
Persistence & Privilege
The skill is not marked 'always' and does not request persistent system modifications in the package. It doesn't modify other skills' configs. However, its claimed auto-healing behavior would require elevated privileges at runtime; that is not requested or described in the manifest.
What to consider before installing
Do not install this as-is. Ask the author for: (1) source/origin and reason for the three hardcoded external targets (why monitor those domains by default); (2) an explanation or implementation of the restart/auto-heal behavior (what exact commands will be run, required privileges, and safeguards); (3) a declared list of dependencies (requests, psutil) and required binaries (docker), or an install spec; (4) removal of hardcoded third‑party endpoints or a way for the user to configure monitored targets. If you must test it, run it in a sandboxed environment with minimal privileges and network access restricted, and review any restart actions before allowing the agent to execute them autonomously.Like a lobster shell, security has layers — review code before you run it.
first editionvk97cejtxjaf6g3zr8xbbyjyxmn81s2s7latestvk97cejtxjaf6g3zr8xbbyjyxmn81s2s7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
