Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

OpenClaw Session Cleanup

v1.0.0

Diagnose and stabilize long-running OpenClaw deployments that accumulate stale sessions, unreaped agents, browser-control timeouts, gateway websocket 1006 cl...

0· 290·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md instructions, templates, and scripts all align: the skill runs OpenClaw CLI commands, installs a cron prune job, renders a tuned config, and can install a watchdog unit. Required binaries (bash, openclaw) match the declared purpose.
Instruction Scope
SKILL.md instructs running openclaw CLI commands, adding swap, and installing cron/systemd watchdogs — all relevant. These instructions do change system state (crontab, swap, systemd timer/service); they do not attempt to read unrelated secrets or system paths. Users should be aware the playbook performs privileged/administrative operations (swap creation, restarting services) when followed.
Install Mechanism
There is no platform install spec; the repo provides local scripts (install-to-openclaw.sh, install-cron-prune.sh, install-watchdog.sh). README suggests a one-line curl|bash installer from GitHub raw URLs — the source is a well-known host (raw.githubusercontent.com), but piping remote scripts to bash has inherent risk and should be reviewed before running.
Credentials
The skill declares no environment variables, no credentials, and only requires the openclaw binary — this is proportional to its stated purpose. The scripts do not access secrets or unrelated env vars.
Persistence & Privilege
The skill can persist recurring behavior: it installs a per-user cron job (writes crontab) and offers to install a systemd timer/service (system-level). Installing the systemd units targets /etc/systemd/system by default (requires elevated privileges). This persistence is coherent with a watchdog/automation role but is a meaningful system-level change that users should consent to.
Assessment
This skill appears to do what it says: prune/clear OpenClaw sessions, render safer runtime limits, add a cron job, and optionally install a systemd watchdog and swap. Before installing, review the scripts (especially install-to-openclaw.sh, install-watchdog.sh, and the raw GitHub URL if you use the curl|bash one-liner). Note that adding swap and enabling systemd units changes system state and may require sudo; the watchdog unit will attempt to restart OpenClaw gateway automatically. If you don't want system-wide changes, install only into a workspace skills directory or run the cron/script steps manually after inspection.

Like a lobster shell, security has layers — review code before you run it.

latestvk97fs3j37b3ghp1dgvfwpgwrg982fhv8openclawvk97fs3j37b3ghp1dgvfwpgwrg982fhv8opsvk97fs3j37b3ghp1dgvfwpgwrg982fhv8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧹 Clawdis
Binsbash, openclaw

Comments