Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Zanna Aperta
v3.4.0MCP Bridge completo per OpenClaw con 45 tool per agenti, workspace, progetti, cron, browser, canvas, nodes, messaging, gateway, Ollama e ClawX
⭐ 0· 39·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Benign
high confidencePurpose & Capability
Name/description claim (MCP Bridge for OpenClaw exposing many tools) matches the code and SKILL.md: the script runs an OpenClaw CLI (OPENCLAW_BIN), manipulates workspace directories, and implements the listed tool handlers (agents, workspace, projects, cron, browser, exec, Ollama, ClawX, etc.). Nothing required by the code (workspace access, openclaw binary, optional local Ollama/ClawX) is out of scope for a bridge tool.
Instruction Scope
SKILL.md instructs adding the Python script to ~/.openfang/settings.json and to set OPENCLAW_WORKSPACE/OPENCLAW_BIN — the script reads/writes workspace files and uses the OpenClaw CLI. The instructions do not ask for unrelated files, secrets, or external endpoints beyond optional local services (ollama on localhost and ClawX path). The code does perform filesystem I/O within the workspace and spawns OpenClaw/other local commands, which is expected behavior for this functionality.
Install Mechanism
There is no external install spec or network download; the skill is instruction-only and ships a Python file. Installation consists of placing and running the included script in the user's OpenClaw skills path — no remote archives or third‑party package installs are performed by the skill itself.
Credentials
The skill requests no credentials and the only environment/config it uses (OPENCLAW_WORKSPACE, OPENCLAW_BIN) is directly relevant to its purpose. It will read and write files in the workspace directories it manages; this file access is proportionate to a workspace/agent management bridge but users should note any secrets stored in those directories could be accessed.
Persistence & Privilege
always is false and model invocation is allowed (platform default). The skill does not request permanent platform-level privileges or modify other skills' configurations. It will create, update, and delete files under the configured workspace and may start/stop local services (ClawX) which is consistent with its role.
Assessment
This skill appears coherent for a local MCP/OpenClaw bridge, but it executes local commands and reads/writes your OpenClaw workspace. Before installing: (1) review the included zanna-aperta.py yourself (it will run with your user permissions); (2) ensure no sensitive credentials or secrets are stored under the configured workspace path; (3) be aware it can create/delete workspaces, invoke OpenClaw tools, and interact with local services (Ollama on localhost and ClawX); (4) run it in a test or isolated environment if you want to limit risk; and (5) verify the openclaw binary and any local services it talks to are trusted. If you want extra assurance, ask for a full line-by-line review of the Python file (the provided snippet is large) or run the skill with a read-only workspace copy first.Like a lobster shell, security has layers — review code before you run it.
latestvk978ps6txa4qen27qtsabv5hg9847z91
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
