GitHub Auto Reply

PassAudited by VirusTotal on May 10, 2026.

Overview

Type: OpenClaw Skill Name: github-auto-reply Version: 1.0.0 The skill bundle describes a GitHub auto-reply agent. All files, including the `SKILL.md` instructions, are aligned with the stated purpose of providing automated responses to GitHub issues. The `SKILL.md` contains example GitHub Actions YAML and JavaScript-like logic snippets, which are presented as configuration guidance for the user or as logical behaviors for the AI agent to implement, not as direct malicious commands for the agent to execute. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or prompt injection attempts designed to subvert the OpenClaw agent. The attribution link `sendwealth.github.io` is benign and does not instruct any harmful actions.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A misconfigured template or trigger could post unwanted public replies, though the artifact does not show hidden or destructive behavior.

Why it was flagged

The workflow automatically posts an issue comment whenever a new issue is opened. This is the advertised function, but it is still a repository mutation and may create public-facing output.

Skill content
on:
  issues:
    types: [opened]
...
github.rest.issues.createComment({ ... body: reply })
Recommendation

Review the reply text, test in a noncritical repository, and consider narrower triggers or manual approval if public replies require review.

What this means

The repository's Actions policy could become broader than necessary, and unpinned action versions can change over time.

Why it was flagged

The setup depends on an external GitHub Action pinned only to a major version and suggests enabling all Actions rather than only the needed action.

Skill content
uses: actions/github-script@v6
...
仓库 Settings > Actions > Allow all actions
Recommendation

Pin the action to a trusted immutable version or commit SHA, and prefer allowing only the required trusted Actions instead of enabling all Actions.

What this means

The workflow needs permission to write issue comments, and broad default GitHub token permissions may grant more access than this task needs.

Why it was flagged

The workflow uses GitHub API authority from the Actions runtime to write issue comments. This is expected for the integration, and no token logging or unrelated credential use is shown.

Skill content
github.rest.issues.createComment({
  issue_number: context.issue.number,
  owner: context.repo.owner,
  repo: context.repo.repo,
  body: reply
});
Recommendation

Add an explicit least-privilege permissions block, such as issue-comment write access only, and avoid using personal tokens for this workflow.