Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

All Allow

v1.0.0

快速设置 OpenClaw 最大权限配置。 版本: 1.0.0 | 最低 OpenClaw: 2026.3.31 支持环境: Linux ✅ | macOS ✅ | WSL ✅ | Windows ⚠️ 功能: - 设置 tools.exec 为最大权限(host: auto, security: full, a...

0· 93·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for yubinsheng/allallow.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "All Allow" (yubinsheng/allallow) from ClawHub.
Skill page: https://clawhub.ai/yubinsheng/allallow
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install allallow

ClawHub CLI

Package manager switcher

npx clawhub@latest install allallow
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description promise (set OpenClaw to maximal permissions) matches what the files do: reading ~/.openclaw/openclaw.json, backing it up, modifying permission-related fields and restarting the gateway. The required capabilities (exec, fs, gateway) declared in SKILL.md are those actually needed.
!
Instruction Scope
Instructions and allallow.js only operate on the OpenClaw config and the system OpenClaw CLI (openclaw status, openclaw gateway restart) and enumerate local network interfaces to build allowedOrigins. While coherent with the stated goal, the instructions explicitly turn off sandboxing, allow unrestricted filesystem access, allow all node commands, set gateway.bind to 'lan', and set control UI to allowInsecureAuth=true — actions that materially widen attack surface and enable unauthenticated or LAN-based access. This is expected for the skill's purpose but is a serious security risk and should only be run in isolated/trusted environments.
Install Mechanism
No install spec; this is instruction + bundled Node script. No downloads from external URLs, no archive extraction, and package.json is local. No unusual install mechanism detected.
Credentials
The skill requests no environment variables or external credentials. The declared need for exec/fs/gateway permissions is proportional to modifying config and restarting the gateway. It does not attempt to read tokens/keys or contact external endpoints; it only enumerates local network interfaces for allowedOrigins.
!
Persistence & Privilege
The skill persistently modifies OpenClaw configuration to grant maximal privileges (disables sandboxing, allows full file access, enables insecure auth and LAN binding). Although the skill itself does not request always:true or modify other skills' configs, its persistent changes grant the platform much broader privileges and long-lived insecure state — this is a high-impact change and should be treated as privileged.
Assessment
This skill is internally consistent with its stated purpose, but it intentionally and persistently reduces system security. Before installing/running it: 1) Only run in an isolated, ephemeral, or fully trusted environment (e.g., disposable VM or container). 2) Inspect ~/.openclaw/openclaw.json before and after running; keep the backup created by the script. 3) Be aware it sets control UI allowInsecureAuth=true and binds the gateway to 'lan' — this can enable unauthenticated or LAN-wide access. 4) Do not run on production machines or on networks you do not fully control. 5) If unsure, use the provided rollback or restore the backup, and consider running the script with non-root or limited privileges first. 6) If you need tighter behavior, manually edit only the specific fields you intend to change instead of applying the full template.
allallow.js:44
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

full-accessvk970k4z6kwchdr9tpkpdyaz61x8410mjlatestvk970k4z6kwchdr9tpkpdyaz61x8410mjpermissionsvk970k4z6kwchdr9tpkpdyaz61x8410mjsecurityvk970k4z6kwchdr9tpkpdyaz61x8410mj
93downloads
0stars
1versions
Updated 3w ago
v1.0.0
MIT-0

allallow Skill v1.0.0

版本信息

项目版本
Skill 版本1.0.0
最低 OpenClaw 版本2026.3.31
更新日期2026-04-01

支持的环境

环境支持状态说明
Linux (原生)✅ 完全支持推荐环境
macOS✅ 完全支持推荐环境
Windows (WSL)✅ 完全支持推荐环境
Windows (原生)⚠️ 部分支持路径格式可能有差异
Docker✅ 支持需在容器内运行

使用前提

安装此 skill 需要一定的初始权限:

所需权限说明
exec 执行权限需要运行 Node.js 脚本
fs 文件读取权限需要读取当前配置
fs 文件写入权限需要写入新配置
gateway 重启权限需要重启网关生效

如果当前权限不足:

  • 安装时可能需要手动批准
  • 或先通过 openclaw config 命令手动修改配置
  • 或由管理员代为安装

安装

# 方法 1:复制到 OpenClaw skills 目录
cp -r skills/allallow ~/.openclaw/skills/

# 方法 2:使用 openclaw 命令
openclaw skills install ./skills/allallow

使用

应用最大权限配置

openclaw skills run allallow
# 或
cd skills/allallow && node allallow.js apply

回滚配置

node allallow.js rollback

备份当前配置

node allallow.js backup

显示信息

node allallow.js info

不同环境的差异

Linux / macOS / WSL

  • 配置路径:~/.openclaw/openclaw.json
  • 完全支持所有功能
  • 自动检测网络接口并配置 allowedOrigins

Windows (原生)

  • 配置路径:%USERPROFILE%\.openclaw\openclaw.json
  • 路径格式使用反斜杠
  • 网络接口检测可能受限
  • 建议使用 WSL 获得最佳体验

Docker

  • 需在容器内运行 skill
  • 确保容器内安装了 Node.js
  • 配置持久化需要挂载卷

隐私说明

此 skill 不会收集或打包任何隐私信息:

数据类型是否收集说明
网关令牌 (token)❌ 否不读取、不存储
频道凭证 (appId/appSecret)❌ 否不读取、不存储
API Key❌ 否不读取、不存储
IP 地址⚠️ 临时检测仅用于配置 allowedOrigins,不存储不传输
配置内容⚠️ 本地读取仅本地修改,不上传

✅ 只包含通用的配置模板

配置说明

此 skill 会修改以下配置:

{
  "tools": {
    "profile": "full",
    "exec": {
      "host": "auto",
      "security": "full",
      "ask": "off"
    },
    "fs": {
      "workspaceOnly": false
    }
  },
  "agents": {
    "defaults": {
      "sandbox": {
        "mode": "off"
      }
    }
  },
  "gateway": {
    "bind": "lan",
    "nodes": {
      "denyCommands": []
    },
    "controlUi": {
      "allowInsecureAuth": true,
      "allowedOrigins": ["..."]
    }
  }
}

安全警告

⚠️ 此 skill 会大幅降低系统安全性:

  • 执行命令无需批准 - 任何操作直接执行
  • 可访问任何文件 - 不受 workspace 限制
  • 沙箱已关闭 - 无隔离保护
  • 允许所有节点命令 - 相机、短信、联系人等敏感操作

仅在受信任的环境中使用!

回滚方法

方法 1:使用 skill

cd skills/allallow
node allallow.js rollback

方法 2:手动恢复

cp ~/.openclaw/openclaw.json.backup ~/.openclaw/openclaw.json
openclaw gateway restart

方法 3:重置为默认

openclaw onboard

故障排除

无法读取配置文件

# 检查文件权限
ls -la ~/.openclaw/openclaw.json

# 手动创建配置目录
mkdir -p ~/.openclaw

网关重启失败

# 手动重启
openclaw gateway restart

# 检查状态
openclaw status

配置不生效

# 检查版本
openclaw version

# 更新到最新版
openclaw update

版本历史

1.0.0 (2026-04-01)

  • ✅ 初始版本
  • ✅ 支持 OpenClaw 2026.3.31
  • ✅ 支持 Linux / macOS / WSL
  • ✅ 自动检测环境
  • ✅ 自动配置 allowedOrigins
  • ✅ 添加版本检测
  • ✅ 添加隐私保护说明

Comments

Loading comments...