Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
auto-daily-summary
v1.0.1自动为所有OpenClaw Agent设置每日23:30的日记总结cron任务,自动检测Agent及时区,确保无重复且支持多平台运行。
⭐ 0· 181·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md and the Python script clearly require the 'openclaw' CLI and Python 3, but the registry metadata lists no required binaries. Timedatectl is also used as a fallback on Linux. The core capability (creating cron jobs) matches the description, but the skill fails to declare needed runtime dependencies.
Instruction Scope
Instructions are narrow and consistent with the stated goal (discover agents, check existing cron jobs, add missing ones). However, the script composes shell commands (openclaw cron add) by interpolating agent IDs and workspace paths into a single shell string and then runs subprocess.run(..., shell=True). If agent IDs or workspace paths are maliciously crafted or contain unexpected characters, that can lead to command injection. The script does not read or transmit data to external endpoints beyond running OpenClaw CLI commands.
Install Mechanism
Instruction-only skill with no install spec or archive downloads; nothing is written to disk by an installer beyond the user placing the files. This is the lower-risk install model.
Credentials
The skill requests no credentials or secrets and only reads system timezone sources (e.g., /etc/timezone, TZ env, timedatectl). That access is proportionate to the stated task. However, metadata omission of required binaries (openclaw, python) is an inconsistency to address.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or global agent configuration beyond creating cron jobs for agents via the OpenClaw CLI, which is consistent with its purpose.
What to consider before installing
What to consider before installing/using this skill:
- The script does what the description says (create daily 23:30 cron jobs for each agent) but the package metadata omits that it requires the 'openclaw' CLI and Python 3; ensure those are present and trusted on the host.
- Security risk: the script builds shell commands by interpolating agent IDs and workspace paths and calls subprocess.run(..., shell=True). If an agent ID or workspace path contains malicious characters, that could allow arbitrary shell command execution. Only run this tool in environments where you trust the OpenClaw agent registry output.
- Recommended mitigations before running:
- Inspect the script yourself and, if possible, run it in a restricted test account or container first.
- Replace or patch the script to call subprocess.run with a list of args (no shell=True) or safely escape arguments (e.g., shlex.quote) when composing the cron add command.
- Ensure the OpenClaw CLI is the official binary and not a tampered executable; verify its install source and version.
- Back up existing cron settings and consider a dry-run mode that prints the commands instead of executing them (you can modify the script to do this).
- If you are not comfortable auditing or patching the script, consider asking the skill author to (1) update registry metadata to list required binaries, and (2) fix argument handling to avoid shell=True with interpolated untrusted values.
Confidence note: the assessment is 'suspicious' rather than 'malicious' because the code's behavior aligns with its stated purpose, but there is a clear and avoidable security flaw and metadata omissions that warrant caution.Like a lobster shell, security has layers — review code before you run it.
latestvk979493mzqh0c77t8t6r6xmh5h82t4sb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
