AI CEO Automation

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: ai-ceo-automation Version: 1.0.0 The skill instructs the AI agent to `git clone` a repository from a third-party GitHub account (`https://github.com/sendwealth/claw-intelligence`) as part of its 'Quick Start' setup in `SKILL.md`. While this action is presented as a necessary step for 'AI CEO automation,' it introduces a supply chain risk. If the remote repository were compromised or contained malicious code, the agent would fetch it, potentially leading to further compromise if the agent is subsequently instructed to execute scripts from the cloned content. This represents a significant capability that could be abused, but without explicit malicious instructions within the provided skill bundle, it is classified as suspicious rather than malicious.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You may end up running automation code that was not reviewed as part of this skill.

Why it was flagged

The reviewed package contains only the instruction file, but the setup directs users to obtain the actual workflows and scripts from an external repository that was not included for review.

Skill content
git clone https://github.com/sendwealth/claw-intelligence
Recommendation

Inspect the external repository, especially .github/workflows and any scripts, before enabling or running anything; prefer pinned, trusted actions and a test repository first.

What this means

Automated workflows could post customer-facing replies, deploy public content, or perform repository actions in ways you did not intend.

Why it was flagged

The skill asks users to enable a broad GitHub Actions setting while also describing workflows for issue auto-replies, deployments, reports, and hourly checks, but it does not define approval, token-permission, or action-source limits.

Skill content
启用 GitHub Actions ... 启用 "Allow all actions"
Recommendation

Do not enable broad Actions permissions blindly; restrict workflow permissions, require manual approvals for customer/public actions, and allow only reviewed or pinned actions.

What this means

Workflows may run with repository authority and could affect your GitHub project, Pages site, or issue interactions.

Why it was flagged

Changing repository Actions settings requires privileged GitHub repository control, but the skill gives no guidance on least-privilege repository roles, GITHUB_TOKEN permissions, or safe handling of production secrets.

Skill content
进入仓库 Settings > Actions
Recommendation

Use a dedicated test repository or organization, set minimal GITHUB_TOKEN permissions, avoid adding production secrets until reviewed, and separate automation accounts from owner/admin accounts.

What this means

The automation may continue acting after setup, including when you are not actively supervising it.

Why it was flagged

The skill explicitly promotes recurring autonomous operation, including hourly CEO checks and 24/7 customer service, without describing stop conditions, audit review, or disable/uninstall steps.

Skill content
`ceo-hourly-check.yml` - CEO 每小时检查
Recommendation

Disable scheduled workflows by default, enable them one at a time, add clear stop conditions and alerts, and document how to pause or remove them.

What this means

A mistaken template, workflow, or agent decision could be repeated across many customers or public channels.

Why it was flagged

The skill encourages one automated system to serve multiple customers, while also advertising automated acquisition, response, delivery, and monitoring; no containment or per-customer approval boundary is described.

Skill content
规模效应: 一套系统服务多个客户
Recommendation

Add per-customer isolation, manual review for outbound messages and deliveries, rollback plans, and monitoring before using the automation beyond a test environment.