Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Release Manager
v2.1.1Release Manager
⭐ 0· 614·5 current·6 all-time
byAlireza Rezvani@alirezarezvani
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description and included files (changelog_generator.py, version_bumper.py, release_planner.py) align with a release-management tool. However the README claims "No external dependencies required (uses only Python standard library)" while SKILL.md and code snippets show network calls (requests) and CI integrations — this is an internal inconsistency (reasonable for the purpose but misleading).
Instruction Scope
Runtime instructions and examples frequently reference reading git history, piping git log into the scripts, and calling external services (GitHub API via requests, curl to feature-flag endpoints). Those are coherent with release tooling, but the skill does not document required network access or credentials. The release_plan generator shows direct calls to api.github.com (which may require authentication for private repos) and the sample rollback plan includes curl/kubectl commands; the SKILL.md does not instruct how to safely run those or declare required tokens.
Install Mechanism
There is no install spec (instruction-only), so nothing is downloaded automatically — lower risk. However the README/SKILL.md claim no external dependencies while code examples use the 'requests' library and CI examples reference jq/gcloud/git/gh actions. That mismatch is a packaging/documentation inconsistency to clarify before use.
Credentials
The package declares no required environment variables or primary credential, yet instructions and code examples access external APIs (GitHub endpoints) and CI context variables (GITHUB_OUTPUT, github.repository). For private repos or higher-rate GitHub usage, a token is typically required (GITHUB_TOKEN/GH_TOKEN) but none are declared. This gap could cause unexpected network calls or failures and may prompt a user to provide credentials without guidance.
Persistence & Privilege
The skill is not always-enabled, does not request system-wide configs, and has no install step that writes files to system locations. It appears to be a local tooling package; no automatic persistent privileges are requested.
What to consider before installing
This skill largely does what it says (generate changelogs, recommend version bumps, produce release plans), but there are some red flags to check before installing:
- Verify dependencies: open the Python files (release_planner.py especially) and confirm whether they import non-standard packages (e.g., requests). If so, the README claiming "no external dependencies" is incorrect — install those packages in a controlled environment (virtualenv) before running.
- Network access and credentials: the release planner calls the GitHub API in examples. Decide whether you will run this against public repos only or private ones. For private repos or to avoid rate limits you may need to provide a GitHub token; the skill does not declare or request one, so plan how you'll supply credentials safely (CI secrets, not pasted into chat).
- Review for subprocess/network effects: inspect the code for any subprocess, os.system, or exec usage that would run shell commands. The sample rollback JSON contains commands like kubectl, curl, and redis-cli — these are examples, but confirm scripts only generate commands rather than executing them automatically.
- Run in a sandbox first: execute the scripts on a test checkout or sample data (assets/) to observe behavior and network calls before pointing them at production repositories or granting credentials.
- Check provenance: the source/owner is unknown. Prefer tools from a known maintainer or fork and audit the code; if you will use this in CI, pin the repository and add dependency and security reviews.
If you want, I can scan the actual Python files for network calls, subprocess usage, and external imports and produce a short summary of risky lines to review next.Like a lobster shell, security has layers — review code before you run it.
latestvk970w0z90ahz1eb910316gtzjx82mvfw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
