Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

usage-costs

v1.0.0

Report AI token usage and estimated costs. Use when: owner asks about costs today/yesterday/this week, per session, or per model. Shows main session, cron jo...

0· 51·0 current·0 all-time
byNetanel Abergel@netanel-abergel
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (report token usage and estimated costs) matches what the SKILL.md does: it reads OpenClaw live status, cron run JSONL files, and token-history JSONL to compute usage and costs. No unrelated external services, credentials, or installs are requested.
!
Instruction Scope
Instructions tell the agent to 'source' a local .context file at /opt/ocana/... which will execute any shell code in that file (execution risk). The skill reads many local files (/opt/ocana/... cron runs, sessions, token-history) and explicitly instructs appending JSON to token-history.jsonl — i.e., it both reads and writes system-wide data. Reading those OpenClaw files is coherent for cost reporting, but sourcing an arbitrary file and writing to shared data increase the attack surface and privilege requirements.
Install Mechanism
Instruction-only skill with no install spec, no external downloads, and no dependencies. This is the lowest install risk.
!
Credentials
Registry metadata declares no required env vars, but SKILL.md expects variables provided by the sourced .context (OWNER_PHONE, PRICING_INPUT/OUTPUT/CACHE_READ). That mismatch means the skill will obtain configuration/secret values from an on-disk file rather than declared env vars. Sourcing a file to obtain these values can execute code and may expose hidden local settings; the skill does not request or need external API keys but it does access local potentially sensitive state.
Persistence & Privilege
The skill is not marked always:true and is instruction-only (no persistent install). However it instructs appending daily reports to /opt/ocana/openclaw/workspace/data/token-history.jsonl, so it will modify on-disk state under the OpenClaw workspace. Autonomous invocation is allowed by default (normal), which means the agent could run these read/write actions without extra user intervention.
What to consider before installing
This skill appears to do what it claims (compute token usage/costs from OpenClaw data), but there are concrete operational risks you should consider before installing or enabling it: - Inspect the .context file (/opt/ocana/openclaw/workspace/skills/usage-costs/.context) before allowing the skill to run. Because the skill sources that file, any shell code in it would be executed — ensure it contains only simple key=value lines and no commands. - Confirm the OpenClaw CLI and the directories referenced (/opt/ocana/openclaw/cron/runs, /opt/ocana/openclaw/agents/main/sessions, /opt/ocana/openclaw/workspace/data) are accessible only to trusted users; the skill reads potentially sensitive session and run logs. - Be aware the skill appends to token-history.jsonl. If you want read-only reporting, avoid or sandbox the write step (or require manual approval before writes). - Prefer safer alternatives: instead of sourcing a shell file, the skill could parse a JSON config or accept explicit declared env vars. If you maintain this environment, consider replacing 'source' with a non-executing parser. - Run the skill with least privilege (non-root agent user) and, if possible, test in a staging environment first. Why 'suspicious' rather than 'benign': there is no evidence of misdirection or external exfiltration, but the use of 'source' on a file and implicit reading/writing of shared system files increases risk and constitutes a mismatch with the declared metadata (no env vars declared). If you can confirm the .context contents are benign and you accept the on-disk writes, the remaining footprint is reasonable for the stated purpose. If you want higher confidence, provide the contents of the .context file (or confirm it's purely key=value), and confirm file permissions/owners for the referenced paths — that information would allow raising confidence to high or downgrading the concern.

Like a lobster shell, security has layers — review code before you run it.

latestvk9780g24ktpfbrpa137hz751ah84bwrs

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments