Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

GitHub Passwordless Setup

Complete GitHub passwordless authentication setup using SSH keys and Personal Access Tokens. Never type passwords or re-authenticate for Git operations and G...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 399 · 0 current installs · 0 all-time installs
byhappy dog@happydog-intj
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
The name/description match the delivered artifacts: SKILL.md plus setup.sh/verify.sh implement SSH + PAT configuration for GitHub. However the guidance asks for a long-lived PAT and high-privilege scopes (delete_repo, admin:org) which are not required for basic push/pull/gh usage and are disproportionate to the stated goal.
!
Instruction Scope
Instructions are mostly limited to SSH key generation and gh auth login, which is in-scope. Concerns: SKILL.md explicitly recommends piping a remote script into bash (curl | bash), and the included setup.sh generates keys with an empty passphrase (-N "") despite earlier advice that a passphrase is recommended — that is an incoherence and weakens security. The PAT guidance also encourages 'No expiration' and broad scopes, which collects overly powerful credentials.
!
Install Mechanism
No formal install spec in the registry, but SKILL.md suggests running curl -fsSL https://raw.githubusercontent.com/happydog-intj/.../setup.sh | bash. Raw GitHub is a common host but piping remote content directly to bash is risky. The package does include the script so users can inspect it before running — but the documentation promotes the risky one-liner.
!
Credentials
The skill declares no required env or credentials, which is fine, but the runtime instructions instruct the user to create and register a PAT with 'No expiration' and elevated scopes (repo full, workflow, delete_repo, admin:org). Those scopes and permanence are excessive for typical passwordless Git operations and increase exfiltration/abuse risk if the token is exposed.
Persistence & Privilege
The skill does not request always-on privileges and does not attempt to modify other skills or system-wide agent settings. It writes SSH keys to the user's ~/.ssh and uses gh to store auth, which is expected and proportional to the purpose.
What to consider before installing
This skill performs legitimate SSH and GitHub CLI setup, but take precautions before running anything: 1) Do not run curl | bash from an unknown repo without reading the script — the repository is raw.githubusercontent.com/happydog-intj, inspect setup.sh first (the package already contains it). 2) Prefer creating a PAT with the minimum required scopes for your workflows and set an expiration; avoid 'No expiration' and avoid admin:org unless you explicitly need org-admin rights. 3) Consider protecting your SSH key with a passphrase (the included setup.sh uses -N "" which creates an unprotected key). 4) If you need automation, store tokens securely (CI secrets vault) rather than long-lived tokens on disk. 5) If you proceed, review setup.sh and verify.sh line-by-line and test with a throwaway account/repo first; revoke the PAT if anything seems off. Overall the skill is coherent in purpose but includes risky recommendations and an incoherence between its own advice and script behavior, so treat it cautiously.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
authenticationvk978dpntxffdce61q2ktafftwx81j9ccclivk978dpntxffdce61q2ktafftwx81j9ccgithubvk978dpntxffdce61q2ktafftwx81j9cclatestvk978dpntxffdce61q2ktafftwx81j9ccsshvk978dpntxffdce61q2ktafftwx81j9cc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

GitHub Passwordless Setup

Complete guide to setting up passwordless authentication for GitHub using SSH keys and Personal Access Tokens (PAT). Once configured, you'll never need to enter passwords for Git operations or GitHub CLI commands.

Verified Working:

  • ✅ macOS 10.15+ (tested on 14.4)
  • ✅ Linux (Ubuntu, Debian, Fedora, Arch)
  • ✅ Windows (WSL2, Git Bash)

🎯 What This Solves

Before:

  • ❌ Type password every time you push/pull
  • ❌ GitHub CLI requires re-authentication
  • ❌ Tokens expire and break workflows
  • ❌ HTTPS URLs need credentials repeatedly

After:

  • ✅ Zero-password Git operations (push/pull/clone)
  • ✅ Zero-password repository creation
  • ✅ Zero-password issue/PR management
  • ✅ Persistent authentication (no expiration)

🚀 Quick Setup

One-line automated setup:

curl -fsSL https://raw.githubusercontent.com/happydog-intj/github-passwordless-setup/master/setup.sh | bash

Or follow the manual steps below.

📋 Manual Setup

Part 1: SSH Key Configuration

SSH keys enable password-free Git operations (push/pull/clone).

Step 1: Check for Existing SSH Keys

ls -la ~/.ssh/*.pub

If you see id_ed25519.pub or id_rsa.pub, you already have a key. Skip to Step 3.

Step 2: Generate New SSH Key

Recommended: ED25519 (most secure)

ssh-keygen -t ed25519 -C "your-email@example.com"

Or RSA (if ED25519 not supported):

ssh-keygen -t rsa -b 4096 -C "your-email@example.com"

During generation:

  • Press Enter for default location (~/.ssh/id_ed25519)
  • Enter passphrase (optional but recommended)
  • macOS will save passphrase to Keychain

Step 3: Copy Public Key

# macOS
cat ~/.ssh/id_ed25519.pub | pbcopy

# Linux (xclip)
cat ~/.ssh/id_ed25519.pub | xclip -selection clipboard

# Linux (xsel)
cat ~/.ssh/id_ed25519.pub | xsel --clipboard

# Or just display and copy manually
cat ~/.ssh/id_ed25519.pub

Step 4: Add Key to GitHub

  1. Visit: https://github.com/settings/ssh/new
  2. Title: Your Computer Name (macOS/Linux)
  3. Key type: Authentication Key
  4. Key: Paste your public key
  5. Click Add SSH key

Step 5: Test SSH Connection

ssh -T git@github.com

Expected output:

Hi username! You've successfully authenticated, but GitHub does not provide shell access.

Part 2: GitHub Personal Access Token

PAT enables password-free GitHub CLI operations (create repos, manage issues/PRs).

Step 1: Generate Token

Visit: https://github.com/settings/tokens/new

Configuration:

  • Note: OpenClaw CLI Token (or any description)
  • Expiration: No expiration (or 90 days)
  • Select scopes:
    • repo (all sub-scopes)
    • workflow (if using GitHub Actions)
    • delete_repo (if you need to delete repositories)
    • admin:org (if managing organizations)

Click Generate token and copy it immediately (shown only once!).

Format: ghp_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Step 2: Install GitHub CLI

macOS:

brew install gh

Linux (Debian/Ubuntu):

type -p curl >/dev/null || (sudo apt update && sudo apt install curl -y)
curl -fsSL https://cli.github.com/packages/githubcli-archive-keyring.gpg | sudo dd of=/usr/share/keyrings/githubcli-archive-keyring.gpg
sudo chmod go+r /usr/share/keyrings/githubcli-archive-keyring.gpg
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/githubcli-archive-keyring.gpg] https://cli.github.com/packages stable main" | sudo tee /etc/apt/sources.list.d/github-cli.list > /dev/null
sudo apt update
sudo apt install gh -y

Other Linux: See: https://github.com/cli/cli/blob/trunk/docs/install_linux.md

Step 3: Configure Token

# Method 1: Interactive (paste when prompted)
gh auth login --with-token
# Then paste your token and press Enter

# Method 2: One-line (replace YOUR_TOKEN)
echo "ghp_YOUR_TOKEN_HERE" | gh auth login --with-token

Step 4: Set Git Protocol to SSH

gh config set git_protocol ssh

This ensures gh commands use SSH (not HTTPS) for Git operations.

Part 3: Verification

Verify SSH Configuration

# Test SSH connection
ssh -T git@github.com

# Expected: Hi username! You've successfully authenticated...

Verify GitHub CLI

# Check authentication status
gh auth status

# Expected: ✓ Logged in to github.com account username

# Test API access
gh api user --jq '.login'

# Expected: your-username

Verify Complete Workflow

# Test creating a repository (will create and delete)
gh repo create test-auth-$(date +%s) --public --description "Test" \
  && echo "✅ Create: SUCCESS" \
  && gh repo delete $(gh repo list --limit 1 --json name --jq '.[0].name') --yes \
  && echo "✅ Delete: SUCCESS"

All operations should complete without prompting for passwords.

🔄 Convert Existing Repos to SSH

If you have existing repositories using HTTPS URLs:

# Check current remote
git remote -v

# If it shows https://github.com/...
# Convert to SSH
git remote set-url origin git@github.com:username/repo.git

# Verify
git remote -v
# Should show: git@github.com:username/repo.git

Batch convert all repos in a directory:

find . -name ".git" -type d | while read gitdir; do
  cd "$gitdir/.."
  if git remote get-url origin 2>/dev/null | grep -q "https://github.com"; then
    REPO=$(git remote get-url origin | sed 's|https://github.com/|git@github.com:|')
    git remote set-url origin "$REPO"
    echo "✅ Converted: $(pwd)"
  fi
  cd - > /dev/null
done

🛠️ Automated Setup Script

Save this as setup.sh:

#!/bin/bash
set -e

echo "🔐 GitHub Passwordless Setup"
echo "============================"
echo ""

# Check for existing SSH key
if [ -f ~/.ssh/id_ed25519.pub ]; then
    echo "✅ SSH key already exists"
    SSH_KEY=$(cat ~/.ssh/id_ed25519.pub)
elif [ -f ~/.ssh/id_rsa.pub ]; then
    echo "✅ SSH key already exists (RSA)"
    SSH_KEY=$(cat ~/.ssh/id_rsa.pub)
else
    echo "📝 Generating new ED25519 SSH key..."
    ssh-keygen -t ed25519 -C "$(whoami)@$(hostname)" -f ~/.ssh/id_ed25519 -N ""
    SSH_KEY=$(cat ~/.ssh/id_ed25519.pub)
    echo "✅ SSH key generated"
fi

echo ""
echo "🔑 Your public SSH key:"
echo "━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━"
echo "$SSH_KEY"
echo "━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━"
echo ""
echo "📋 Next steps:"
echo "1. Copy the key above"
echo "2. Visit: https://github.com/settings/ssh/new"
echo "3. Paste the key and save"
echo "4. Come back and press Enter to continue"
read -p "Press Enter after adding the key to GitHub..."

# Test SSH
echo ""
echo "🧪 Testing SSH connection..."
if ssh -T git@github.com 2>&1 | grep -q "successfully authenticated"; then
    echo "✅ SSH authentication successful!"
else
    echo "❌ SSH authentication failed. Please check your key on GitHub."
    exit 1
fi

# Check for GitHub CLI
echo ""
if ! command -v gh &> /dev/null; then
    echo "📦 GitHub CLI not found. Install it from:"
    echo "   macOS: brew install gh"
    echo "   Linux: https://github.com/cli/cli/blob/trunk/docs/install_linux.md"
    exit 1
fi

# Configure GitHub CLI
echo "🎫 Configuring GitHub CLI..."
echo "Please enter your GitHub Personal Access Token:"
echo "(Visit https://github.com/settings/tokens/new if you don't have one)"
echo ""
gh auth login --with-token

# Set git protocol to SSH
gh config set git_protocol ssh

# Verify
echo ""
echo "🔍 Verifying configuration..."
if gh auth status &> /dev/null; then
    echo "✅ GitHub CLI authenticated"
    USERNAME=$(gh api user --jq '.login')
    echo "✅ Username: $USERNAME"
else
    echo "❌ GitHub CLI authentication failed"
    exit 1
fi

echo ""
echo "🎉 Setup complete!"
echo ""
echo "You can now:"
echo "  • Push/pull without passwords: git push"
echo "  • Create repos instantly: gh repo create my-project --public"
echo "  • Manage issues/PRs: gh issue create, gh pr list"
echo ""

Make it executable and run:

chmod +x setup.sh
./setup.sh

🔍 Troubleshooting

SSH Issues

Problem: "Permission denied (publickey)"

# Check SSH agent
ssh-add -l

# If empty or error, add your key
ssh-add ~/.ssh/id_ed25519

# macOS: Add to Keychain permanently
ssh-add --apple-use-keychain ~/.ssh/id_ed25519

Problem: "Host key verification failed"

# Remove old host key
ssh-keygen -R github.com

# Reconnect (will prompt to add new key)
ssh -T git@github.com

GitHub CLI Issues

Problem: "Requires authentication"

# Check token validity
gh auth status

# Re-authenticate
gh auth logout
gh auth login --with-token

Problem: "Token scopes insufficient"

Create a new token with broader scopes:

General Issues

Check Configuration Files:

# SSH config
cat ~/.ssh/config

# GitHub CLI config
cat ~/.config/gh/hosts.yml

# Git config
git config --global --list

🔒 Security Best Practices

SSH Keys

  1. Use ED25519 (more secure than RSA)
  2. Set a passphrase (optional but recommended)
  3. Use ssh-agent (macOS Keychain, gnome-keyring)
  4. Never share private keys (id_ed25519 - no .pub)
  5. Revoke compromised keys immediately at https://github.com/settings/keys

Personal Access Tokens

  1. Minimum scopes needed (don't select all)
  2. Set expiration (90 days for security, or no expiration for convenience)
  3. Revoke unused tokens at https://github.com/settings/tokens
  4. Never commit tokens to repositories
  5. Rotate regularly (every 90 days recommended)

📚 Advanced Configuration

SSH Config File

Create ~/.ssh/config for custom settings:

Host github.com
  HostName github.com
  User git
  IdentityFile ~/.ssh/id_ed25519
  AddKeysToAgent yes
  UseKeychain yes

Multiple GitHub Accounts

# ~/.ssh/config
Host github-personal
  HostName github.com
  User git
  IdentityFile ~/.ssh/id_ed25519_personal

Host github-work
  HostName github.com
  User git
  IdentityFile ~/.ssh/id_ed25519_work

Clone with specific account:

git clone git@github-personal:username/repo.git
git clone git@github-work:company/repo.git

Git Aliases

Add to ~/.gitconfig:

[alias]
  pushf = push --force-with-lease
  undo = reset --soft HEAD~1
  amend = commit --amend --no-edit
  sync = !git fetch --all && git pull

🌐 Environment Variables

Optional environment variables for automation:

# GitHub CLI
export GH_TOKEN="ghp_xxxxx"  # Auto-auth for gh commands

# Git
export GIT_SSH_COMMAND="ssh -i ~/.ssh/id_ed25519"  # Force specific key

Add to your shell profile (~/.bashrc, ~/.zshrc):

# GitHub CLI auto-auth (optional)
if [ -f ~/.config/gh/token ]; then
  export GH_TOKEN=$(cat ~/.config/gh/token)
fi

🔄 Maintenance

Update SSH Key

# Generate new key
ssh-keygen -t ed25519 -C "new-email@example.com"

# Add to GitHub
cat ~/.ssh/id_ed25519.pub | pbcopy
# Visit: https://github.com/settings/ssh/new

# Update old repos (if using specific key in config)
git config core.sshCommand "ssh -i ~/.ssh/id_ed25519"

Rotate GitHub Token

# Create new token at https://github.com/settings/tokens/new
# Configure it
echo "ghp_NEW_TOKEN" | gh auth login --with-token

# Revoke old token at https://github.com/settings/tokens

📊 Comparison: HTTPS vs SSH

FeatureHTTPSSSH
AuthenticationUsername + TokenSSH Key
Password neededEvery operationNever
Setup complexityLowMedium
SecurityGoodExcellent
Corporate firewallsUsually allowedSometimes blocked
RecommendationBeginnersDaily use

🎯 Common Workflows

Create New Project

# Create repo and push in one go
gh repo create my-project --public --source=. --push

# Or step by step
gh repo create my-project --public
git remote add origin git@github.com:username/my-project.git
git push -u origin main

Clone Private Repo

# SSH (no password)
git clone git@github.com:username/private-repo.git

# Check access
gh repo view username/private-repo

Manage Issues

# Create issue
gh issue create --title "Bug found" --body "Description"

# List issues
gh issue list

# Close issue
gh issue close 123

🤝 Contributing

Found an issue or improvement? Pull requests welcome!

📄 License

MIT License

🔗 Related Links


Made with ❤️ for developers who value automation

Files

5 total
Select a file
Select a file to preview.

Comments

Loading comments…