Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Session Wrap-Up Premium
v1.0.0Premium session wrap-up: flush daily log, update MEMORY, update PARA, git commit + push, generate summary. Ensures zero context loss between sessions. Includ...
⭐ 0· 34·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description match the implementation: the code appends session summaries to memory/YYYY-MM-DD.md, updates MEMORY.md and notes/areas/open-loops.md, and runs git add/commit/push. The PARA and summary features described in SKILL.md are implemented in the script.
Instruction Scope
The SKILL.md and run.py instruct the agent to modify workspace files and run git add/commit/push automatically with no confirmation. More importantly, git_commit_push builds a shell command using an unescaped user-supplied commit message and calls subprocess.run(..., shell=True) — this is a command injection vector. The skill also can write arbitrary content into notes files from provided inputs.
Install Mechanism
No install spec; this is an instruction-only skill with a bundled script. Nothing is downloaded from external URLs and no packages are installed during install-time.
Credentials
The skill requests no environment variables or credentials, which is consistent superficially. However, it performs git push using whatever Git credentials/remote are configured in the environment — it can therefore expose repository contents (including secrets) to the configured remote without explicit consent. Combined with the command-injection risk, this implicit use of existing credentials elevates the danger.
Persistence & Privilege
always is false and the skill does not claim to modify global agent config or other skills. It operates only on the current working directory (workspace), so it does not request elevated platform privileges.
What to consider before installing
This skill is functionally coherent but potentially dangerous in practice. Before installing or running it:
- Do not run it in a repository or workspace that contains secrets, private keys, or sensitive files; the skill will run git add -A and git push automatically.
- Treat the commit_message input as untrusted: the script inserts it into a shell command using shell=True, making it vulnerable to command injection. Avoid passing untrusted text as commit_message or patch the script to use subprocess.run([...], shell=False) or a Git library (e.g., GitPython) to pass arguments safely.
- Prefer requiring explicit confirmation before committing/pushing. The current behavior is automatic by design and can cause accidental pushes.
- If you must use it, run it in an isolated test workspace first and inspect notes and memory files it will create.
- Consider these code fixes before use: escape/validate the commit message, call subprocess.run with a list (no shell=True), or use a native Git API to avoid shell interpolation; add an interactive confirmation step prior to git push; and limit the agent's ability to invoke the tool autonomously.
- Review your Git remote (origin) and credentials — the skill will use whatever is configured locally and could upload data to remote servers without additional prompts.
Because the implementation matches the described purpose but has clear unsafe handling of shell commands and automatic push behavior, I rate it as suspicious. If you want, I can produce a safe patch for git_commit_push and a checklist of runtime safeguards to reduce risk.Like a lobster shell, security has layers — review code before you run it.
gitvk978nb89mmmz7e1j9sk61kaxrn840sghlatestvk978nb89mmmz7e1j9sk61kaxrn840sghpersistencevk978nb89mmmz7e1j9sk61kaxrn840sghsessionvk978nb89mmmz7e1j9sk61kaxrn840sghwrap-upvk978nb89mmmz7e1j9sk61kaxrn840sgh
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
