Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Hiveram

v1.0.0

Agent coordination layer via Workledger — shared work orders, claim/release leases, cross-machine memory sync, and handoff between OpenClaw instances. Use wh...

0· 52·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description describe an agent coordination layer using Workledger and the skill requires the workledger CLI; the SKILL.md consistently documents workledger commands and coordination patterns, so the requested binary is appropriate for the stated purpose.
!
Instruction Scope
The SKILL.md instructs the agent (and the user) to create a key file at ~/.openclaw/workledger.key and to export WORKLEDGER_API_KEY and WORKLEDGER_URL for runtime use. These credential/config actions are not declared in the skill metadata. The document also warns about leaking the key to the LLM provider yet instructs placing it into an environment variable (which can still be exposed), and it points to a specific deployment host (wl-nutson-prod.fly.dev) that differs from the public service domain (hiveram.com). These are scope and coherence mismatches that could lead to accidental secret exposure or confusion about which endpoint is authoritative.
Install Mechanism
The SKILL.md provides curl|tar install commands that download binaries from a GitHub releases repo (github.com/ppiankov/hiveram-dist). Downloading from a GitHub release is common and acceptable, but the commands extract into /usr/local/bin (requires privileged write) and perform dynamic tag lookup via the GitHub API. Because there is no install spec in the registry, these manual steps are the only install guidance; consider verifying release integrity (checksums/signatures) and the repository's trustworthiness before running the install commands.
!
Credentials
The registry metadata lists no required environment variables or config paths, yet the runtime instructions require an API key file and instruct exporting WORKLEDGER_API_KEY and WORKLEDGER_URL. Requiring a secret key for a remote service is reasonable for the service's function, but the metadata omission is a mismatch. Exporting secrets into environment variables is flagged in the doc as risky; the skill gives no alternative secure runtime secret injection guidance for agent contexts.
Persistence & Privilege
The skill does not request always:true or other elevated platform privileges. It does instruct writing a key file to ~/.openclaw/workledger.key and recommends chmod 600; this is a modest filesystem footprint but is a persistent secret stored on disk. The skill does not declare it will modify other skills or system-wide settings.
What to consider before installing
This skill appears to be what it says (an OpenClaw coordination layer using the workledger CLI) but there are a few red flags to review before installing: - Metadata mismatch: the registry declares no required env vars/config paths, but the SKILL.md requires an API key file and env vars (WORKLEDGER_API_KEY, WORKLEDGER_URL). Treat the API key as sensitive and confirm why the metadata omits it. - Secret handling: the instructions ask you to store the key in ~/.openclaw/workledger.key and export it. Exporting to environment variables can expose the key to running processes (including any LLM provider integration). Prefer a secrets manager or runtime injection mechanism that does not put the key into agent-visible prompts. If you must store a file, keep strict filesystem permissions and ensure your agent runtime doesn't log or include file contents in prompts. - Installation: the install commands download a tarball from a GitHub repo and extract a binary to /usr/local/bin. Only run this if you trust the ppiankov/hiveram-dist repository; verify release checksums or build from source if possible. The install requires write permissions to system paths. - Endpoint mismatch: the doc mentions the public site (hiveram.com) but sets WORKLEDGER_URL to a fly.dev host. Ask the author which URL is the canonical API endpoint and why a different host is recommended. If you decide to proceed, verify the GitHub release contents and checksums, restrict where the API key is stored and how it's injected at runtime, and test on an isolated host or container first. If you cannot confirm the provenance of the binary or the endpoint, mark this skill as high-risk and avoid installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk97420zj5exhc4wa9qk1qqjnqx83n08d

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binsworkledger

Comments