Neckr0ik Session Healer

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill mostly matches its stated purpose, but its visible code can remove OpenClaw session locks without reliably proving the session is inactive, which could damage active sessions.

Use this only when you are confident a session lock is stale. Run check or a dry run first, avoid --force and unlock on sessions that may still be active, and back up ~/.openclaw before using recover. No network exfiltration or credential use is visible in the provided artifacts, but the lock-deletion safety behavior needs review.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

No VirusTotal findings for this skill version.

Malicious
0
Suspicious
0
Harmless
0
Undetected
65
View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An active OpenClaw session could lose its lock, allowing concurrent writes and possible session corruption or lost context.

Why it was flagged

If a lock file has no parseable PID, the code marks it as not alive, and the heal/unlock flows remove lock files with unlink(). That can clear a lock without positively confirming the owning process is gone.

Skill content
is_alive=False,  # Assume stale if we can't find PID ... lock.lock_path.unlink()
Recommendation

Default to dry-run/check first, require explicit confirmation for deletion, add an age threshold, and do not delete locks when the process owner cannot be verified unless the user explicitly forces it.

What this means

A user may run the tool believing active sessions are always protected, when some code paths can still remove locks without a reliable live-process check.

Why it was flagged

The safety claim is stronger than the visible implementation: unlock removes a matching lock directly, and PID-less locks are assumed stale. This could cause users to over-trust the safety of mutating commands.

Skill content
- Never clears locks for processes that are still alive (unless --force)
Recommendation

Update the documentation to describe the exact behavior and risks, and make the code enforce the documented safety guarantee for every mutating command.

What this means

Recovered sessions may have lines removed, changing the stored session history or context the agent later sees.

Why it was flagged

The recover command intentionally edits persistent OpenClaw session files. This is disclosed and purpose-aligned, but it affects stored agent session state.

Skill content
Attempts to recover a corrupted session file:
- Validates JSON lines
- Removes corrupted lines
- Creates backup before recovery
Recommendation

Use recovery only for the intended session, keep the backup, and review what changed before continuing important work.

What this means

It is harder to verify where the code came from or how the advertised command is installed.

Why it was flagged

The artifacts do not provide a source repository, homepage, or install wiring for the documented command. This limits provenance and packaging verification.

Skill content
Source: unknown
Homepage: none
No install spec — this is an instruction-only skill.
Recommendation

Review the included script before use and prefer a version with a clear source repository and reproducible install instructions.