Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

ClawDoctor

v4.0.0

Behavioral cost coach for OpenClaw fleets. Analyzes your sessions, shows what you did that cost money, and coaches you on what to do differently. Finds both...

0· 426·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The name/description (cost analysis) matches the actions in SKILL.md (list agents, fetch sessions, fetch transcripts, produce reports). However the SKILL.md repeatedly invokes the 'openclaw gateway' CLI via exec and reads/writes memory/*.json state files, yet the registry metadata declares no required binaries and no required config paths. That is an internal inconsistency: the skill actually needs access to the OpenClaw gateway and local memory paths to function.
Instruction Scope
Instructions explicitly instruct the agent to fetch full session transcripts for the top 5 sessions and to write memory/last-analysis.json and memory/pending-fixes.json. Fetching transcripts is coherent with cost analysis, but transcripts can contain secrets and sensitive content; the SKILL.md does not include any redaction step and instructs the agent to use exact session keys. The SKILL.md also includes explicit config-patch payloads (references) and instructs the operator that it can apply fixes if asked — that means it can propose and (with user approval) execute changes across agents.
Install Mechanism
This is instruction-only (no install spec, no code files beyond docs). That reduces risk from arbitrary download/execute. Still, it depends on runtime exec access to 'openclaw gateway' which must already be available in the environment.
!
Credentials
The skill requests no env vars and no primary credential in metadata, but its behavior requires gateway access to list agents, read sessions, and (optionally) patch configs — that implies platform-level credentials/permissions. The absence of declared credential/config-path requirements is disproportionate to the privileged actions the skill performs.
Persistence & Privilege
always:false (good). The skill writes its own memory/* JSON state files (last-analysis.json, pending-fixes.json) — that's reasonable. The notable privilege is the ability (per references) to invoke config.patch to change other agents' configs; SKILL.md frames this as 'I can fix these for you — tell me which', which implies the skill may be able to perform fleet-wide changes when instructed. That capability is powerful; combine that with autonomous invocation (platform default) and it increases blast radius unless apply actions are gated by explicit user confirmation.
What to consider before installing
Key things to consider before installing: - Metadata mismatch: The skill's docs call the 'openclaw gateway' CLI and read/write memory/*.json, but the registry metadata declares no required binaries or config paths. Treat that as a red flag — confirm the environment will provide the gateway CLI and that you understand the file writes. - Privileged gateway access: The skill lists agents, fetches session transcripts, and includes config.patch fix payloads. Those operations require gateway privileges and can change other agents' configs. Only install if you trust the skill author and you intend it to run with fleet-admin level access. - Sensitive data exposure: The skill fetches full transcripts (exact session keys). Transcripts can include secrets; ensure you are comfortable with the tool reading and including transcript content in reports. Ask whether transcripts are redacted or filtered before analysis. - Explicit apply controls: The skill can propose config patches. Make sure it cannot auto-apply fixes without explicit, human confirmation. Prefer a workflow where it writes pending-fixes.json and requires a separate, auditable approval step to call config.patch. - Least privilege & testing: Run this first in a small/test fleet with limited privileges. Verify reports, inspect pending-fixes.json, and confirm no automatic changes occur. If possible, restrict the skill's ability to exec or to call config.patch until you are ready. - Provenance check: Source is listed as 'unknown' and owner ID is not a known vendor. Verify the author (Faan AI homepage is given) and confirm you trust that organization before granting gateway/admin capabilities. What would increase my confidence: explicit metadata stating the required binary ('openclaw'), required config paths (memory/*), and a clear opt-in confirmation flow for applying fixes (and/or a demonstration that transcripts are redacted). If those are provided, the skill appears coherent for its purpose; without them, proceed cautiously.

Like a lobster shell, security has layers — review code before you run it.

analyticsvk97dhhnb7f673p89h5zh2xkvxn81qvcecostvk97dhhnb7f673p89h5zh2xkvxn81qvcelatestvk97dhhnb7f673p89h5zh2xkvxn81qvceoptimizationvk97dhhnb7f673p89h5zh2xkvxn81qvce

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🩺 Clawdis

Comments