1-SEC: All-in-One Cybersecurity for AI Agent Hosts
v0.4.15Install, configure, and manage 1-SEC — an open-source, all-in-one cybersecurity platform (16 modules, single binary) on Linux servers and VPS instances. Use...
⭐ 0· 814·1 current·1 all-time
by@cutmob
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill claims to install and manage the 1-SEC security binary and the included script and docs do exactly that (download a release binary, verify checksum, install, run setup, apply presets). That capability is proportional to the stated purpose. However: the registry metadata (version 0.4.15) does not match the SKILL.md and installer script (version 0.4.11), and the package provides no homepage while pointing to an external GitHub repo in SKILL.md. These mismatches reduce confidence in provenance.
Instruction Scope
Runtime instructions and the installer script are narrowly scoped to downloading a specific GitHub release binary, verifying its SHA256, installing it, running non-interactive setup, and applying a preset (default: safe/dry-run). The README/runbooks include high-impact operational instructions (vps-agent preset with skip_approval: true that will kill processes and quarantine files, cloud API options, webhook notifications). Those powerful enforcement behaviors are documented and opt-in, but they are present in the instructions and can be enabled by the operator — users should be aware of the destructive actions the product can take if presets are changed.
Install Mechanism
No opaque third-party downloads or pastebin URLs are used: the installer script fetches binaries and checksums directly from GitHub Releases and verifies SHA256 before installing. The script explicitly avoids piping remote content to shell, deletes mismatched downloads, and documents manual verification. This is an expected and reasonably safe install approach if you trust the GitHub release source and account.
Credentials
No environment variables are required by the skill, and SKILL.md only lists optional env vars (GEMINI_API_KEY, ONESEC_API_KEY, ONESEC_WEBHOOK_URL). The references mention additional env patterns (e.g., GEMINI_API_KEY_2) and cloud API keys for centralized management; these are optional but carry privacy/credential implications. Enabling cloud or AI correlation will transmit alert metadata/host identifiers off-host (documented as opt-in). Requesting webhook URLs and API keys is proportional to the product's features but merits operator review before enabling.
Persistence & Privilege
The skill does not request 'always: true' and does not force persistent installation by itself; it installs a binary that is intended to run as a local daemon. The product recommends running with sudo/root for full enforcement, which is consistent with a host security agent but increases privilege impact. The runbooks document auto-update/selfupdate behavior (checks for updates daily) and an opt-in cloud control plane — both normal for agents but notable from an operational-security perspective.
What to consider before installing
This package appears to be a legitimate installer for an on-host security agent, but review these points before installing:
- Verify provenance: compare the repository and release referenced in SKILL.md to the official project (the skill points to github.com/1sec-security/1sec). Confirm the GitHub owner is who you expect and inspect the release artifacts and checksums yourself. The registry's reported version (0.4.15) differs from the files (0.4.11) — resolve that mismatch.
- Prefer manual install & verification: follow the documented manual download + sha256sum verification rather than running scripts blindly. Check checksums.txt on GitHub and verify locally.
- Test in isolation: install first in a non-production/staging environment. The platform can (if you enable aggressive presets) kill processes and quarantine files automatically — test with dry-run and the safe preset.
- Be cautious with opt-ins: enabling cloud.enabled, GEMINI_API_KEY, or webhook URLs will transmit alert metadata and host identifiers off-host. Only enable these to trusted endpoints and rotate any API keys you provide.
- Review presets before applying: the vps-agent preset disables approval gates and may use skip_approval for critical actions. The installer defaults to dry-run safe mode, but applying aggressive presets has high impact.
- Confirm auto-update and uninstall procedures: understand how selfupdate works and how to fully remove the agent (the docs provide steps). Consider disabling auto-update if you require stricter control.
If you want higher confidence, ask the publisher to provide a homepage, reproducible release artifacts, GPG-signed releases, or an SBOM — and confirm the registry metadata is updated to match the shipped files.Like a lobster shell, security has layers — review code before you run it.
ai-agentvk972rt6g6dbx23hjayx8j43xq981mcjycybersecurityvk972rt6g6dbx23hjayx8j43xq981mcjyendpoint-defensevk972rt6g6dbx23hjayx8j43xq981mcjyintrusion-detectionvk972rt6g6dbx23hjayx8j43xq981mcjylatestvk9708j8kxf8b3k5f126x2x411d81r092llm-firewallvk972rt6g6dbx23hjayx8j43xq981mcjyprompt-injectionvk972rt6g6dbx23hjayx8j43xq981mcjyransomwarevk972rt6g6dbx23hjayx8j43xq981mcjysecurityvk97dh7cerwkabamg8fs4597g8981pvyysingle-binaryvk972rt6g6dbx23hjayx8j43xq981mcjyvpsvk972rt6g6dbx23hjayx8j43xq981mcjy
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
