SOTA AI Model Tracker
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: sota-tracker-mcp Version: 1.0.0 The OpenClaw AgentSkills skill bundle is classified as suspicious due to its use of persistent execution mechanisms and modification of sensitive agent configuration files. Specifically, `SKILL.md` and `README.md` instruct the agent to set up daily `systemd` timers or `cron` jobs to execute `scripts/update_sota_claude_md.py`. This script then modifies `~/.claude/CLAUDE.md`, a critical file for AI agent instructions, and can execute other scripts within the bundle via `subprocess.run` (e.g., `scrapers/run_all.py`). While the current content written to `CLAUDE.md` and the executed scripts are for the benign purpose of updating SOTA model data, these capabilities represent a high level of control over the agent's environment and configuration, which could be misused if the code or instructions were altered.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If an agent follows these instructions, it may create or delegate background work through a separate system rather than only answering model-tracking questions.
This file is packaged with the skill and instructs an agent to hand work to an external/background orchestration system, which is unrelated to SOTA model tracking and could cause autonomous activity outside the user’s intended task.
Delegate to Cyrus - execution happens automatically
Remove maintainer-specific Cyrus/Linear orchestration instructions from the distributed skill, or clearly isolate them from user-facing agent instructions and require explicit user approval before any delegation.
Future Claude sessions could rely on automatically refreshed model recommendations or instructions without the user noticing the change each time.
The skill recommends writing externally updated SOTA data into a persistent Claude instruction/context file, so scraped or compromised data could influence future agent sessions.
This embeds a compact SOTA summary directly in your `~/.claude/CLAUDE.md` file.
Only enable persistent agent-file updates if you trust the data source; prefer a clearly marked block, backups, easy rollback, and explicit opt-in before enabling daily timers.
Users may run code or install dependencies from a repository/branch that is not pinned or verified by the registry metadata.
The registry metadata does not declare a source or homepage, while the documentation points users toward manual GitHub clone/install workflows. That is not malicious by itself, but it leaves provenance verification to the user.
Source: unknown; Homepage: none
Verify the GitHub repository owner, review the code and dependency files, and preferably pin to a trusted commit before running setup commands.
Other devices on the network may be able to query the tracker API if firewall rules permit it.
Binding the REST API to 0.0.0.0 is a disclosed, user-directed server command, but it can expose the API beyond localhost if the machine or network allows inbound access.
uvicorn rest_api:app --host 0.0.0.0 --port 8000
Use 127.0.0.1 for local-only use, and add authentication or firewall restrictions before exposing the API on a network.
