Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Alcor Capability Evolver

v1.0.1

A self-evolution engine for AI agents. Analyzes runtime history to identify improvements and applies protocol-constrained evolution.

0· 108·1 current·1 all-time
byRoamer 徐@roamer-remote

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for roamer-remote/alcor-capability-evolver.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Alcor Capability Evolver" (roamer-remote/alcor-capability-evolver) from ClawHub.
Skill page: https://clawhub.ai/roamer-remote/alcor-capability-evolver
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required env vars: A2A_NODE_ID
Required binaries: node, git
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install alcor-capability-evolver

ClawHub CLI

Package manager switcher

npx clawhub@latest install alcor-capability-evolver
Security Scan
Capability signals
CryptoRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
Name/description (self-evolver) mostly aligns with files that implement an evolver and GEP protocol, and required binaries (node, git) are reasonable. However, the bundle includes behavior that goes beyond a single-agent self-inspection: scripts copy memory and logs from multiple /home/openclaw/.openclaw/workspace_roamer_* workspaces (reading other agents' memories), and the run helper (run_evolver.sh) includes a hardcoded A2A_NODE_SECRET. The declared required env only lists A2A_NODE_ID, which under-represents credentials actually used. These mismatches are disproportionate to a simple 'analyze own runtime history' description.
!
Instruction Scope
SKILL.md and scripts instruct the agent to read many host paths and aggregate logs (memory files, cron run history, commands.log, config audits) and to write evolved code into workspace/src/** and assets. prepare_signals.sh explicitly copies files from other workspace_roamer_* memory directories, which implies cross-agent data access. The skill can spawn sub-agents/bridges and send/receive A2A protocol messages. These instructions collect and act on broad, potentially sensitive data beyond an agent's own local context.
Install Mechanism
No external download/install spec is included (instruction-only install), and dependencies are limited (dotenv). That's lower supply-chain risk than remote fetch-and-extract. However, the skill bundle contains a full Node project with many executable scripts and package metadata that will be present on disk once installed — increasing footprint even without an external installer.
!
Credentials
Declared envs in SKILL.md include A2A_NODE_ID (required) and several optional secrets (A2A_NODE_SECRET, GITHUB_TOKEN, MEMORY_GRAPH_REMOTE_KEY). The bundle itself includes run_evolver.sh that hardcodes A2A_NODE_SECRET and proxy variables — a clear secret leakage and an unexplained credential baked into the package. The skill reads/writes workspace and memory directories and can optionally self-modify (EVOLVE_ALLOW_SELF_MODIFY). The requested environment/credential exposure is broader than what the short description suggests and includes secrets not marked required in the registry metadata.
!
Persistence & Privilege
The skill can run as a long-lived daemon (loop mode), spawn subprocesses, spawn 'bridge' sub-agents, and write evolved code into workspace/src/** when changes are 'solidified'. Autonomous invocation is allowed by default (disable-model-invocation=false). While self-modification is a declared feature (with an opt-out flag), the combination of autonomous runs, ability to modify source, and the skill's ability to read many other agents' files gives it a high privilege and broad blast radius if misused or misconfigured.
Scan Findings in Context
[hardcoded_secret_run_evolver_sh] unexpected: run_evolver.sh in the bundle contains a hardcoded A2A_NODE_SECRET value. A self-evolver might require a node secret for hub auth, but embedding a secret in distributed code is not expected and risks credential leakage.
[reads_other_workspaces_prepare_signals_sh] unexpected: prepare_signals.sh copies memory files from /home/openclaw/.openclaw/workspace_roamer_*/memory and other shared paths. A reasonable evolver needs its own history, but reading multiple other workspace_roamer_* memory directories implies cross-agent access not justified by a minimal self-improvement description.
[self_modify_write_workspace_src] expected: The skill explicitly writes to workspace/src/** when solidifying evolution changes. Self-modification is central to the stated purpose, so this is expected — but it is a high-privilege operation and should be gated.
[wide_log_collection_commands_log_tail] unexpected: The signal-prep step copies the last 500 lines of a global commands.log and other system logs. Collecting host-level command logs increases exposure of sensitive user commands and may exceed what a user expects from an 'analyze runtime history' feature.
[contradictory_capabilities_declaration] unexpected: SKILL.md capabilities.allow and deny sections contain contradictory entries (e.g., allow network: api.github.com and deny network: "!api.github.com" syntax). This indicates sloppy or unclear permission configuration that should be clarified before trusting runtime enforcement.
What to consider before installing
This skill implements an automated self-evolver and includes many server-side scripts that read logs and memories, modify source files, and interact with a network hub. Before installing: - Do NOT run it unreviewed in production. Audit the code paths that read files (prepare_signals.sh, any code touching /home/openclaw) and restrict them to only the directories you intend to expose. - Remove or rotate the hardcoded secret found in run_evolver.sh; treat it as compromised. Prefer supplying A2A_NODE_SECRET via a secret store or env at runtime, and mark it required if the skill needs it. - Keep EVOLVE_ALLOW_SELF_MODIFY set to false unless you explicitly want autonomous self-modification; prefer review mode (--review) for initial runs. - Run the evolver only in an isolated environment (non-root, limited user) and with minimal envs/permissions; consider disabling network or restricting proxy to inspect traffic first. - Confirm the intended network endpoints (evomap.ai, api.github.com, any MEMORY_GRAPH URLs) and whether the hub is trustworthy. - If you need more confidence: ask the publisher for provenance (who published this skill, source repo, maintainer contact), request signed releases, and have an independent code audit of scripts that copy logs, spawn sub-agents, or perform git operations.
index.js:33
Shell command execution detected (child_process).
scripts/build_public.js:170
Shell command execution detected (child_process).
scripts/generate_history.js:17
Shell command execution detected (child_process).
scripts/publish_public.js:13
Shell command execution detected (child_process).
scripts/recover_loop.js:19
Shell command execution detected (child_process).
scripts/suggest_version.js:27
Shell command execution detected (child_process).
src/evolve.js:281
Shell command execution detected (child_process).
src/gep/deviceId.js:51
Shell command execution detected (child_process).
src/gep/llmReview.js:70
Shell command execution detected (child_process).
src/gep/solidify.js:66
Shell command execution detected (child_process).
src/ops/health_check.js:20
Shell command execution detected (child_process).
src/ops/lifecycle.js:27
Shell command execution detected (child_process).
src/ops/self_repair.js:17
Shell command execution detected (child_process).
src/ops/skills_monitor.js:96
Shell command execution detected (child_process).
scripts/publish_public.js:248
Environment variable access combined with network send.
src/evolve.js:56
Environment variable access combined with network send.
src/gep/a2aProtocol.js:75
Environment variable access combined with network send.
src/gep/hubReview.js:104
Environment variable access combined with network send.
src/gep/hubSearch.js:19
Environment variable access combined with network send.
src/gep/issueReporter.js:21
Environment variable access combined with network send.
src/gep/memoryGraphAdapter.js:77
Environment variable access combined with network send.
src/gep/skillDistiller.js:8
Environment variable access combined with network send.
src/gep/taskReceiver.js:11
Environment variable access combined with network send.
src/ops/self_repair.js:45
Environment variable access combined with network send.
!
scripts/publish_public.js:254
File read combined with network send (possible exfiltration).
!
src/evolve.js:371
File read combined with network send (possible exfiltration).
!
src/gep/a2aProtocol.js:41
File read combined with network send (possible exfiltration).
!
src/gep/hubReview.js:24
File read combined with network send (possible exfiltration).
!
src/gep/issueReporter.js:42
File read combined with network send (possible exfiltration).
!
src/gep/questionGenerator.js:20
File read combined with network send (possible exfiltration).
!
src/gep/skillDistiller.js:21
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Binsnode, git
EnvA2A_NODE_ID
latestvk97a4czrggzg6mwvk2ad6jhp9d853n03
108downloads
0stars
2versions
Updated 1w ago
v1.0.1
MIT-0

🧬 Capability Evolver

"Evolution is not optional. Adapt or die."

The Capability Evolver is a meta-skill that allows OpenClaw agents to inspect their own runtime history, identify failures or inefficiencies, and autonomously write new code or update their own memory to improve performance.

Features

  • Auto-Log Analysis: Automatically scans memory and history files for errors and patterns.
  • Self-Repair: Detects crashes and suggests patches.
  • GEP Protocol: Standardized evolution with reusable assets.
  • One-Command Evolution: Just run /evolve (or node index.js).

Usage

Standard Run (Automated)

Runs the evolution cycle. If no flags are provided, it assumes fully automated mode (Mad Dog Mode) and executes changes immediately.

node index.js

Review Mode (Human-in-the-Loop)

If you want to review changes before they are applied, pass the --review flag. The agent will pause and ask for confirmation.

node index.js --review

Mad Dog Mode (Continuous Loop)

To run in an infinite loop (e.g., via cron or background process), use the --loop flag or just standard execution in a cron job.

node index.js --loop

Setup

Before using this skill, register your node identity with the EvoMap network:

  1. Run the hello flow (via evomap.js or the EvoMap onboarding) to receive a node_id and claim code
  2. Visit https://evomap.ai/claim/<claim-code> within 24 hours to bind the node to your account
  3. Set the node identity in your environment:
export A2A_NODE_ID=node_xxxxxxxxxxxx

Or in your agent config (e.g., ~/.openclaw/openclaw.json):

{ "env": { "A2A_NODE_ID": "node_xxxxxxxxxxxx", "A2A_HUB_URL": "https://evomap.ai" } }

Do not hardcode the node ID in scripts. getNodeId() in src/gep/a2aProtocol.js reads A2A_NODE_ID automatically -- any script using the protocol layer will pick it up without extra configuration.

Configuration

Required Environment Variables

VariableDefaultDescription
A2A_NODE_ID(required)Your EvoMap node identity. Set after node registration -- never hardcode in scripts.

Optional Environment Variables

VariableDefaultDescription
A2A_HUB_URLhttps://evomap.aiEvoMap Hub API base URL.
A2A_NODE_SECRET(none)Node authentication secret issued by Hub on first hello. Stored locally after registration.
EVOLVE_STRATEGYbalancedEvolution strategy: balanced, innovate, harden, repair-only, early-stabilize, steady-state, or auto.
EVOLVE_ALLOW_SELF_MODIFYfalseAllow evolution to modify evolver's own source code. NOT recommended for production.
EVOLVE_LOAD_MAX2.0Maximum 1-minute load average before evolver backs off.
EVOLVER_ROLLBACK_MODEhardRollback strategy on failure: hard (git reset --hard), stash (git stash), none (skip). Use stash for safer operation.
EVOLVER_LLM_REVIEW0Set to 1 to enable second-opinion LLM review before solidification.
EVOLVER_AUTO_ISSUE0Set to 1 to auto-create GitHub issues on repeated failures. Requires GITHUB_TOKEN.
EVOLVER_ISSUE_REPO(none)GitHub repo for auto-issue reporting (e.g. EvoMap/evolver).
EVOLVER_MODEL_NAME(none)LLM model name injected into published asset model_name field.
GITHUB_TOKEN(none)GitHub API token for release creation and auto-issue reporting. Also accepts GH_TOKEN or GITHUB_PAT.
MEMORY_GRAPH_REMOTE_URL(none)Remote knowledge graph service URL for memory sync.
MEMORY_GRAPH_REMOTE_KEY(none)API key for remote knowledge graph service.
EVOLVE_REPORT_TOOL(auto)Override report tool (e.g. feishu-card).
RANDOM_DRIFT0Enable random drift in evolution strategy selection.

Network Endpoints

Evolver communicates with these external services. All are authenticated and documented.

EndpointAuthPurposeRequired
{A2A_HUB_URL}/a2a/*A2A_NODE_SECRET (Bearer)A2A protocol: hello, heartbeat, publish, fetch, reviews, tasksYes
api.github.com/repos/*/releasesGITHUB_TOKEN (Bearer)Create releases, publish changelogsNo
api.github.com/repos/*/issuesGITHUB_TOKEN (Bearer)Auto-create failure reports (sanitized via redactString())No
{MEMORY_GRAPH_REMOTE_URL}/*MEMORY_GRAPH_REMOTE_KEYRemote knowledge graph syncNo

Shell Commands Used

Evolver uses child_process for the following commands. No user-controlled input is passed to shell.

CommandPurpose
git checkout, git clean, git log, git status, git diffVersion control for evolution cycles
git rebase --abort, git merge --abortAbort stuck git operations (self-repair)
git reset --hardRollback failed evolution (only when EVOLVER_ROLLBACK_MODE=hard)
git stashPreserve failed evolution changes (when EVOLVER_ROLLBACK_MODE=stash)
ps, pgrep, tasklistProcess discovery for lifecycle management
df -PDisk usage check (health monitoring fallback)
npm install --productionRepair missing skill dependencies
node -e "..."Inline script execution for LLM review (no shell, uses execFileSync)

File Access

DirectionPathsPurpose
Read~/.evomap/node_idNode identity persistence
Readassets/gep/*GEP gene/capsule/event data
Readmemory/*Evolution memory, narrative, reflection logs
Readpackage.jsonVersion information
Writeassets/gep/*Updated genes, capsules, evolution events
Writememory/*Memory graph, narrative log, reflection log
Writesrc/**Evolved code (only during solidify, with git tracking)

GEP Protocol (Auditable Evolution)

This package embeds a protocol-constrained evolution prompt (GEP) and a local, structured asset store:

  • assets/gep/genes.json: reusable Gene definitions
  • assets/gep/capsules.json: success capsules to avoid repeating reasoning
  • assets/gep/events.jsonl: append-only evolution events (tree-like via parent id)

Emoji Policy

Only the DNA emoji is allowed in documentation. All other emoji are disallowed.

Configuration & Decoupling

This skill is designed to be environment-agnostic. It uses standard OpenClaw tools by default.

Local Overrides (Injection)

You can inject local preferences (e.g., using feishu-card instead of message for reports) without modifying the core code.

Method 1: Environment Variables Set EVOLVE_REPORT_TOOL in your .env file:

EVOLVE_REPORT_TOOL=feishu-card

Method 2: Dynamic Detection The script automatically detects if compatible local skills (like skills/feishu-card) exist in your workspace and upgrades its behavior accordingly.

Safety & Risk Protocol

1. Identity & Directives

  • Identity Injection: "You are a Recursive Self-Improving System."
  • Mutation Directive:
    • If Errors Found -> Repair Mode (Fix bugs).
    • If Stable -> Forced Optimization (Refactor/Innovate).

2. Risk Mitigation

  • Infinite Recursion: Strict single-process logic.
  • Review Mode: Use --review for sensitive environments.
  • Git Sync: Always recommended to have a git-sync cron job running alongside this skill.

Before Troubleshooting -- Check Your Version First

If you encounter unexpected errors or behavior, always verify your version before debugging:

node -e "const p=require('./package.json'); console.log(p.version)"

If you are not on the latest release, update first -- most reported issues are already fixed in newer versions:

# If installed via git
git pull && npm install

# If installed via npm
npm install -g @evomap/evolver@latest

Latest releases and changelog: https://github.com/EvoMap/evolver/releases

License

MIT

Comments

Loading comments...