Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Agent Cluster

v1.0.0

亚马逊外贸B2B多CMS Agent协作系统。支持Shopify/WooCommerce/Magento三大平台,A2A架构协调库存/采购/财务/物流四大专家Agent,三层安全网保障审批合规。即装即用,零配置开箱。

0· 0·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for wangm-a3/agent-cluster.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Agent Cluster" (wangm-a3/agent-cluster) from ClawHub.
Skill page: https://clawhub.ai/wangm-a3/agent-cluster
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Canonical install target

openclaw skills install wangm-a3/agent-cluster

ClawHub CLI

Package manager switcher

npx clawhub@latest install agent-cluster
Security Scan
Capability signals
CryptoRequires walletCan make purchasesCan sign transactionsRequires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name, description, and the included code (connectors for SAP/Shopify/Magento, orchestrator, agents for inventory/finance/logistics, API integration layer) are coherent: the repository implements an enterprise multi‑agent e‑commerce/ERP integrator as claimed.
!
Instruction Scope
SKILL.md tells an agent to run orchestrator.py and to set environment variables for ERP endpoints/API keys (SAP_BASE_URL, SAP_API_KEY, YONYOU_BASE_URL, etc.). The SKILL.md also contains a YAML/system-like header and the static scan flagged a 'system-prompt-override' pattern — this suggests the skill's runtime instructions include embedded agent/system directives which could attempt to affect agent behavior. The instructions reference external APIs and credentials (reasonable for ERP integration) but give the agent broad autonomy to contact those endpoints and use environment variables that were not declared in the registry metadata.
!
Install Mechanism
Registry metadata states 'No install spec — instruction-only', yet the package contains >100 code files and a README that instructs pip installing dependencies and running python orchestrator.py. There is no formal install script in the registry metadata; the user/platform would need to install Python packages and run code manually. This mismatch (instruction-only claim vs. large codebase) is an incoherence and increases operational risk because files will be executed without an automated vetted install step.
!
Credentials
The SKILL.md and README expect multiple environment variables (ERP base URLs and API keys, SYSTEM_MODE, possibly model engine credentials for 'claude-ma'/'deepseek'), but the skill manifest metadata lists no required env vars or primary credential. Requesting ERP API keys is proportionate to ERP integration, however the skill also references external LLM engines (claude-ma, deepseek) that typically require credentials but those are not declared. Undeclared/unnamed secret usage is a notable mismatch and raises the risk of accidental credential exposure or misconfiguration.
Persistence & Privilege
The skill is not marked always:true and uses the normal model-invocation defaults. That is appropriate. However, the codebase includes memory/persistent_store and an audit/logger and describes cross‑agent shared memory and trace export; if you install/run it it will store persistent state locally (SQLite/JSONL) and may retain data across runs. Combined with the other concerns, consider this persistence when deciding where/how to run it.
Scan Findings in Context
[system-prompt-override] unexpected: SKILL.md begins with a YAML-like header and includes extensive runtime instructions for the agent; the static scanner flagged patterns that look like an attempt to override or inject system-level prompts. For an integration/agent orchestration skill some structured metadata is expected, but 'system-prompt-override' patterns are a risk because they could try to alter the agent's execution context or instructions beyond normal configuration.
What to consider before installing
What to consider before installing/running this skill: - Provenance: the repository homepage is provided but the registry metadata showed 'source: unknown'. Confirm you trust the author and that the GitHub repo at the homepage is genuine and unchanged. - Undeclared secrets: SKILL.md/README instruct you to set ERP API keys and other env vars (SAP_*, YONYOU_*, KINGDEE_*, SYSTEM_MODE) and the code references model engines (claude-ma, deepseek). However the skill metadata did not declare these as required. Expect to supply sensitive credentials if you run it; do not put production credentials into an untrusted environment. - Install/run in isolation: because the package includes many Python modules and persistent stores, run it in a throwaway VM/container or CI runner with least privilege. Avoid running on a machine that contains other credentials you care about. - Review network endpoints: inspect connector code (api_integration/, mcp_servers/, connectors/) for all outbound endpoints and where API keys are sent. If you need ERP integration, consider using test/demo ERP endpoints first. - Prompt-injection pattern: the SKILL.md contains structured/system-like content that the scanner flagged. Before granting the agent autonomous invocation or broad network access, review those instruction sections and remove/neutralize anything that tries to override system prompts or inject untrusted instructions. - Credential handling: prefer short‑lived/test credentials or proxy endpoints. If you must provide real ERP credentials, create a dedicated, scoped account with minimal privileges and rotate keys after testing. - Ask the maintainer for clarity: request an explicit manifest listing required environment variables and any external services/credentials (including LLM engines), and ask for an install script or container image. A clear SECURITY.md and reproducible build/install steps would reduce risk. - If you lack ability to audit: consider not installing on production systems. If you want to try it, use 'SYSTEM_MODE=demo' and dummy/test ERP endpoints to validate behavior first.
cms_executor/connectors/base_connector.py:295
Dynamic code execution detected.
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk970qz7cbt7yy2rbv3st4mnj1n85fwmz
0downloads
0stars
1versions
Updated 3h ago
v1.0.0
MIT-0

产业互联网硅基军团 v2.0

企业级Multi-Agent智能体集群系统,基于1+N架构(1个幕僚长+20个专业Agent),参考OpenClaw Main Agent、腾讯ADP Router设计。v2.0全面升级:真实ERP API接入、协作流程细化、错误处理体系。

核心能力

v2.0三大升级

1. 真实API接入层(api_integration/)

  • 多ERP适配器:SAP S/4HANA、用友U8/NC/YonBIP、金蝶K3 Cloud/EAS、通用REST
  • 断路器模式(Circuit Breaker)+ 故障自动降级
  • 健康检查轮询(10s间隔,自动摘除异常节点)
  • 演示模式保留(MockDataGenerator,variance=0.1随机波动)

2. 跨Agent协作细化(collaboration/)

  • 细粒度任务协议(TaskMessage):依赖声明、优先级、TTL
  • 状态同步(SharedStateManager):TTL+pub/sub通知机制
  • 全链路追踪(CollaborationTracker):trace_id/span_id + Mermaid时序图可视化

3. 错误处理与状态管理(error_handling/)

  • 7状态任务状态机:pending→running→success/failed/retry/timeout/cancelled
  • 10类异常自动分类:VALIDATION/NETWORK/TIMEOUT/AUTH/RESOURCE/NOT_FOUND等
  • 5种重试策略:FIXED/EXPONENTIAL/FIBONACCI/JITTER/ADAPTIVE
  • 敏感信息脱敏 + SOC2合规审计日志

系统架构

用户请求 → Orchestrator(意图识别→任务拆解→智能体调度)
    ↓
20个专业Agent:采购/生产/销售/财务/运营/战略/研发/人力/合规
    ↓
API Integration Layer(v2.0新增)
  ├─ SAP/用友/金蝶适配器(真实ERP)
  └─ 断路器+健康检查+Mock降级

目录结构

agent-cluster/
├── orchestrator.py              # 指挥智能体(核心调度器)
├── api_integration/              # v2.0新增:真实API接入层
│   ├── api_adapter.py           # 多ERP适配器(SAP/用友/金蝶)
│   ├── api_config.py            # 配置化管理
│   ├── api_health.py            # 健康检查+断路器
│   └── mock_data.py             # 模拟数据(开发/演示)
├── collaboration/                # v2.0新增:跨Agent协作
│   ├── task_protocol.py         # 细粒度任务协议
│   ├── state_sync.py            # 状态同步+TTL+pub/sub
│   ├── trace_tracker.py         # 全链路追踪+Mermaid
│   └── workflow_engine.py       # 混合执行引擎
├── error_handling/              # v2.0新增:错误处理
│   ├── task_state_machine.py    # 7状态任务状态机
│   ├── exception_middleware.py  # 统一异常处理
│   ├── retry_policy.py          # 5种重试策略
│   └── operation_log.py         # 操作日志+脱敏+合规
├── specialists/                 # 专业智能体
│   ├── inventory_agent.py      # 库存智能体
│   ├── logistics_agent.py       # 物流智能体
│   ├── procurement_agent.py     # 采购智能体
│   ├── finance_agent.py         # 财务智能体
│   └── doc_agent.py            # 工艺文档智能体
├── mcp_servers/                 # MCP协议封装
│   ├── erp_server.py           # ERP系统接口
│   ├── wms_server.py           # WMS仓库管理接口
│   └── srm_server.py           # SRM供应商管理接口
├── safety/                      # 安全围栏
│   ├── permission_manager.py    # RBAC权限管理
│   ├── audit_logger.py          # 全链路审计日志
│   └── human_loop.py            # 人机回环审批
└── config/                      # 配置文件
    ├── agents.yaml             # 智能体定义
    ├── workflows.yaml          # 工作流配置
    └── permissions.yaml        # 权限矩阵

快速开始

环境要求

  • Python 3.10+
  • 依赖:pip install pyyaml fastapi uvicorn httpx aiofiles

运行

cd agent-cluster
python orchestrator.py

配置(生产模式)

export SYSTEM_MODE=production
export SAP_BASE_URL=https://sap.example.com
export SAP_API_KEY=your_api_key
export YONYOU_BASE_URL=https://yonyou.example.com

触发词

塑化报价 | 塑料原料采购 | 库存管理 | 生产排产 | 客户跟进 | 供应商比价 | B2B运营 | 工厂管理 | ERP集成 | 智能客服 | 行业KPI | 成本核算 | 硅基军团 | 工业Agent | 制造业AI | 产业互联网

标签

制造业AI, 产业互联网, Multi-Agent, ERP集成, 智能排产, 供应商管理, 报价系统, 智能工厂, AI运营, 企业数字化

分类

效率工具

版本

v2.0.0 - 三大升级:真实API接入层、协作流程细化、错误处理与状态管理

Comments

Loading comments...