superviser ressources

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is a server monitor, but it asks for autonomous recurring checks and service restarts without clear approval, scope, or stop controls, and it also pings hardcoded external sites.

Review this skill carefully before installing. It is not clearly malicious, but you should not let it automatically restart services or run on a schedule until the monitored targets, allowed restart actions, required privileges, and disable/stop controls are clearly defined.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could restart services or containers in a way that disrupts applications or production workloads.

Why it was flagged

The skill authorizes service restarts and automatic recovery, but the artifacts do not define an allowlist, confirmation requirement, rollback plan, or limits on which services can be restarted.

Skill content
- **/supervisor restart <nom>** : Relance un service spécifique.

L'agent scanne le serveur toutes les 5 minutes et tente une auto-guérison si un site tombe ou si un conteneur s'arrête.
Recommendation

Require explicit user confirmation for restarts, document exact restart commands, add an allowlist of services/containers, and keep status checks separate from mutation actions.

What this means

A user may expect a one-off command but get repeated monitoring or recovery behavior if the agent follows the instruction.

Why it was flagged

This describes recurring autonomous behavior, but the registry says this is an instruction-only skill with no install spec and no clear scheduler, stop command, or user control for ongoing operation.

Skill content
L'agent scanne le serveur toutes les 5 minutes
Recommendation

Make recurring monitoring opt-in, document how it is scheduled, provide a stop/disable command, and avoid autonomous actions unless the user explicitly enables them.

What this means

Running the monitor may contact third-party sites the user did not choose, revealing request metadata such as source IP and timing, and may not monitor the user's own services.

Why it was flagged

The user-facing documentation only says it checks 'Sites', but the code checks three fixed external domains rather than user-configured targets.

Skill content
TARGETS = [
    {"name": "AIFlowHub", "url": "https://aiflowhub.online"},
    {"name": "ProspectX", "url": "https://prospectx.aiflowhub.online/api/health"},
    {"name": "MarocPromo", "url": "https://marocpromo.insightops.online"}
]
Recommendation

Disclose the target URLs in SKILL.md or make them user-configurable before any network checks run.

What this means

If granted Docker or service-management access, the skill can observe container names/statuses and may be able to affect running workloads.

Why it was flagged

The code reads Docker container status, and the documentation also describes container/service restart behavior. Docker and service control can require significant local privileges.

Skill content
subprocess.run(['docker', 'ps', '--format', '{{.Names}}|{{.Status}}'], capture_output=True, text=True)
Recommendation

Run with the least privilege needed, restrict access to intended containers/services, and avoid giving broad Docker or root-equivalent access unless necessary.

What this means

The skill may fail at runtime or cause the agent/user to install dependencies manually without pinned versions.

Why it was flagged

The included code depends on Python packages and the Docker CLI, but the supplied metadata lists no required binaries and there is no install spec.

Skill content
import requests
import psutil
...
subprocess.run(['docker', 'ps', '--format', '{{.Names}}|{{.Status}}']
Recommendation

Declare required packages and binaries, pin versions where applicable, and document setup steps explicitly.