Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Google Analytics 4 Analytics

v1.0.0

Ruft Google Analytics 4 Daten für akku-alle.de ab - Seitenaufrufe, Nutzer, Sessions, Top-Seiten und Traffic-Quellen. Nutze das shell Tool um /root/.openclaw/...

0· 77·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The declared GA4 environment variables (GOOGLE_APPLICATION_CREDENTIALS, GA4_PROPERTY_ID) are appropriate for a Google Analytics 4 integration. However, the SKILL.md directs running a binary located at /root/.openclaw/skills/ga4-analytics/ga4-analytics even though the skill bundle contains no code or install spec to place such a binary there — that mismatch is disproportionate to the stated simple analytics purpose.
!
Instruction Scope
The instructions require using the shell tool to execute a specific local binary path. Because no binary or install steps are included, the agent would attempt to run an external artifact that isn't present in the bundle (or might be planted later). Running an arbitrary binary from /root/.openclaw/... grants it the ability to perform any local actions, which exceeds the narrow analytics task described.
!
Install Mechanism
There is no install spec and no code files; yet the SKILL.md prescribes executing a binary under the skill directory. Lack of an install mechanism to fetch or verify that binary is a red flag — the skill doesn't explain where the executable comes from or how it is vetted.
Credentials
Requesting GOOGLE_APPLICATION_CREDENTIALS and GA4_PROPERTY_ID is reasonable for GA4 access. That said, the credentials (service account key referenced by GOOGLE_APPLICATION_CREDENTIALS) are sensitive and should be scoped to minimal permissions. The registry metadata summary earlier reported no required env vars, creating an inconsistency with the SKILL.md.
!
Persistence & Privilege
SKILL.md metadata sets always:true (force-inclusion) which would give the skill permanent presence; the registry flags provided with the skill summary show always:false. The presence of always:true combined with executing a local binary (and no code provenance) raises the blast radius if the binary is malicious or replaced later.
Scan Findings in Context
[metadata.requires.env] expected: GOOGLE_APPLICATION_CREDENTIALS and GA4_PROPERTY_ID are expected for a GA4 integration; requesting them is proportionate to the stated purpose.
[metadata.always_true] unexpected: SKILL.md contains always:true which is not necessary for a simple analytics fetcher and conflicts with the registry's reported always:false; permanent presence increases risk.
[exec-local-binary-instructions] unexpected: SKILL.md instructs running /root/.openclaw/skills/ga4-analytics/ga4-analytics but the bundle contains no executable or install steps. Executing an unbundled/unspecified binary is unexpected and risky.
What to consider before installing
Do not install or enable this skill yet. Ask the publisher to provide: (1) the executable source or an explicit install spec (with audit-able URL or package) and a checksum, (2) remove or justify the always:true flag, and (3) documentation showing the minimal IAM permissions required by the service account referenced by GOOGLE_APPLICATION_CREDENTIALS. If you must proceed, ensure the service account is scoped to only read the specific GA4 property, verify the binary's provenance and checksum, and avoid granting broad credentials or running unvetted executables from /root paths.

Like a lobster shell, security has layers — review code before you run it.

latestvk97btw0ns2aygw25tbmy2p257183p87n

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments