SystemTemp
Analysis
The skill appears to be a local system-temperature monitor with no evidence of exfiltration or destructive behavior, though users should notice its local logging, optional scheduling, and install-path quirks.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
chmod +x /home/ckk/.openclaw/workspace/skills/system-temp/temp chmod +x /home/ckk/.openclaw/workspace/skills/system-temp/temp.js
The setup script uses a hard-coded user-specific path and references a temp executable path. This is not malicious by itself, but it makes the install mechanism brittle and worth verifying.
# 每小時記錄 0 * * * * /home/ckk/.openclaw/workspace/skills/system-temp/temp >> /tmp/temp.log 2>&1
The README provides a user-directed cron example for recurring hourly execution. It is disclosed and aligned with monitoring, but it would create persistent scheduled activity if the user installs it.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
歷史記錄:`~/openclaw_workspace/data/systemTemp.log` 告警設定:`~/openclaw_workspace/config/tempAlerts.json` 報表:`~/openclaw_workspace/data/reports/`
The skill discloses that it stores temperature history, alert configuration, and reports locally. This persistence is expected for a monitoring tool, but users should know where retained data lives.
