Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

gitlab-skill

v1.0.1

GitLab operations including creating and cloning repositories, listing projects, managing issues, merge requests, branches, commits, and pipelines. Use this...

0· 52·0 current·0 all-time
byAlbert@pickbert
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description align with the code and instructions: the scripts implement GitLab API operations, listing/projects, cloning, creating projects/issues/MRs, and a credential loader. The required capabilities are coherent with a GitLab helper.
!
Instruction Scope
SKILL.md and scripts instruct the agent to read environment variables and user config (~/.claude/gitlab_config.json) and to run curl/git subprocesses. Some runtime behaviors widen scope beyond the documented safe defaults: e.g., several code paths create an unverified SSL context (bypassing TLS verification) and cloning can embed the token into HTTPS clone URLs, which may expose tokens in process lists or repository configs. The skill does not attempt to read unrelated system files, but these network/credential handling behaviors are risky.
Install Mechanism
No install spec or remote downloads; this is an instruction+code bundle that runs locally. No third-party packages are pulled in automatically. No high-risk install URLs were present.
Credentials
Registry metadata declares no required env vars, but the code and SKILL.md clearly expect GITLAB_HOST and GITLAB_TOKEN at runtime — this is reasonable for a GitLab skill but a small metadata mismatch. Credential_loader uses environment vars, a user config file, or legacy scripts/config.json and can optionally save tokens to ~/.claude/gitlab_config.json (with chmod 600). Only GitLab credentials are requested; no unrelated secrets are required.
Persistence & Privilege
always is false and the skill does not request persistent platform-level privileges. The only persistence is optional saving of credentials to the user home config (~/.claude/gitlab_config.json). It does not modify other skills or system-wide settings.
What to consider before installing
This skill appears to do what it claims, but review these risks before installing or running it with real tokens: - Token leakage risk: clone_repo inserts the access token into HTTPS clone URLs (https://oauth2:TOKEN@...), which can expose your token in process listings and may end up stored in .git/config for the cloned repo. Avoid using this behavior or remove tokens from git remotes after cloning; prefer SSH keys or credential helpers. - TLS bypass: several code paths create an unverified SSL context (ssl._create_unverified_context()) or use curl -k when insecure is requested. Confirm when/why TLS verification is disabled; do not use these options in production or against public GitLab instances. - Process & logging exposure: the scripts call subprocesses (curl, git) and build command-line headers that may expose tokens to other local users via process arguments. Run in a trusted environment and avoid shared/multi-user hosts if using real tokens. - Metadata mismatch: the registry metadata lists no required env vars but the skill expects GITLAB_HOST and GITLAB_TOKEN at runtime — ensure your deployment environment supplies these securely. - Saving credentials: the credential loader can save tokens to ~/.claude/gitlab_config.json (it sets 600 permissions). Only allow saving on machines you control, and rotate tokens if exposed. Recommendations: inspect/modify the clone behavior to avoid embedding tokens, ensure TLS verification is enabled by default, run the scripts in an isolated environment for initial testing, give tokens minimal scopes, and rotate tokens after first use. If you need further assurance, request a full audit of the specific functions that disable TLS and modify clone URL handling.

Like a lobster shell, security has layers — review code before you run it.

latestvk97dkdn72953w83hmjrg6v4tqs845xtc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments