Lucky Healthcheck

v1.0.1

Host security hardening and risk-tolerance configuration for OpenClaw deployments. Use when a user asks for security audits, firewall/SSH/update hardening, r...

0· 70·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description match the SKILL.md instructions: everything focuses on host posture, OpenClaw audit commands, and generating remediation plans. The skill does not request unrelated credentials, binaries, or config paths.
Instruction Scope
The instructions explicitly direct the agent to run read-only system commands (uname, ss/lsof, firewall queries, tmutil, openclaw audit/update status) and to ask for permission before state-changing operations. Reading system state (listening ports, backup and encryption status, OpenClaw status) is expected for a hardening skill, but those checks surface sensitive information — the user should only grant read or admin privileges when they understand the implications.
Install Mechanism
No install spec and no code files — this is an instruction-only skill, which minimizes risk from installing external artifacts.
Credentials
The skill declares no environment variables, credentials, or config paths. The SKILL.md references running local commands and OpenClaw CLI options only, which is proportional to a host-hardening checklist.
Persistence & Privilege
always is false and the skill does not request persistent system-wide changes by itself. It does allow autonomous invocation (the platform default) and can recommend or run OpenClaw '--fix' only with explicit approval. Users should be aware that applying host-level fixes will require appropriate OS privileges (root/admin) and that granting those should be done cautiously.
Assessment
This skill is coherent with its stated purpose, but it will access sensitive system information when you permit it to run read-only checks (listening ports, backup/encryption status, OpenClaw status). Before installing or invoking it: (1) confirm you trust the skill source (no homepage/source is provided), (2) when asked, prefer read-only checks first and avoid granting admin/root unless you explicitly want fixes applied, (3) review any proposed changes and have backups/rollback plans in place, and (4) run any fixes in a staged manner (test on a non-critical machine first). If you need stronger assurance, request the skill author/source or a signed release before granting elevated privileges.

Like a lobster shell, security has layers — review code before you run it.

hardeningvk97bgqh2zcv5ybd25gzep2kww983nhq6healthcheckvk97bgqh2zcv5ybd25gzep2kww983nhq6latestvk97bgqh2zcv5ybd25gzep2kww983nhq6openClawvk977k8c5nj6et62zy2vqjhgghd83nbksopenclawvk97bgqh2zcv5ybd25gzep2kww983nhq6securityvk97bgqh2zcv5ybd25gzep2kww983nhq6

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments