Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Architecture Evolution Coordinator

v1.0.0

协调星型记忆架构五阶段演进,管理插件协同,支持理念级外部项目分析与融合方案生成与验证。

0· 159·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for whoisme007/architecture-evolution-coordinator.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Architecture Evolution Coordinator" (whoisme007/architecture-evolution-coordinator) from ClawHub.
Skill page: https://clawhub.ai/whoisme007/architecture-evolution-coordinator
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install architecture-evolution-coordinator

ClawHub CLI

Package manager switcher

npx clawhub@latest install architecture-evolution-coordinator
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The code and SKILL.md implement the advertised capabilities (phase/state checks, external-project analysis, mapping to existing plugins, report generation). However there are notable mismatches: registry metadata declares no required env vars or config paths, but SKILL.md and scripts expect environment variables (EVOLUTION_COORDINATOR_SENDER_EMAIL, EVOLUTION_COORDINATOR_SENDER_PASSWORD, EVOLUTION_COORDINATOR_RECIPIENT_EMAIL, optional GITHUB_TOKEN) and access hardcoded filesystem paths under /root/.openclaw/workspace. The hardcoded root workspace path and a fixed recipient email (johnson007.ye@gmail.com) are not justified by the description and are disproportionate to a generic 'coordinator' skill.
!
Instruction Scope
Runtime instructions and included scripts do more than high-level coordination: they fetch README files from GitHub, map extracted concepts to local plugins, import and instantiate local adapter modules from /root/.openclaw/workspace, run integration test scripts via subprocess, and generate/send reports (including automatic sending to a hardcoded recipient). These operations access local workspace files and may execute local code, which expands the attack surface and could expose or transmit sensitive internal data. The SKILL.md also instructs providing an email password and points to many local log/test paths.
Install Mechanism
There is no install spec (instruction-only with shipped scripts), which reduces installer risk. However SKILL.md references running 'pip install -r requirements.txt' and other local test scripts, but the manifest does not include a requirements.txt or explicit dependency metadata. That mismatch is an operational inconsistency (you may need to install dependencies yourself). No network downloads or obscure install URLs are present in the provided files.
!
Credentials
The skill suggests or uses sensitive environment variables (an email sender password and optionally a GITHUB_TOKEN). Requesting an email account password is high-risk and not strictly necessary if a less-sensitive API token or a dedicated send-only mailbox is used. The scripts also probe local workspace paths (/root/.openclaw/workspace, MEM ORY.md) and may read other skills' files—this level of filesystem access is broad relative to a passive analysis/reporting description. Additionally, metadata claims no required env vars, which contradicts SKILL.md and is misleading.
!
Persistence & Privilege
The skill does not request 'always: true' and allows normal autonomous invocation (default). Nonetheless, it reads and imports code from /root/.openclaw/workspace, runs local integration test scripts, and composes/sends email reports to an external address. That combination lets it access internal project data and transmit it externally (potential exfiltration). While not automatically elevating system privileges, the filesystem and network I/O privileges implied are significant and warrant caution.
What to consider before installing
Key things to consider before installing or running this skill: - Metadata mismatch: The registry lists no required env vars, but SKILL.md and the scripts expect environment variables (email sender address/password, recipient, optional GITHUB_TOKEN) and hardcoded workspace paths. Treat the SKILL.md values as authoritative only after you confirm them. - Sensitive credentials: The skill encourages providing EVOLUTION_COORDINATOR_SENDER_PASSWORD (an email password). Don't supply a personal or high-privilege password. If you need email functionality, use a dedicated send-only mailbox, an app-specific password, or a transactional-email API token with tightly scoped permissions. - Hardcoded external recipient: The skill defaults to sending reports to johnson007.ye@gmail.com. This is unexpected and could leak internal data. Remove or change that default before running; require interactive confirmation if the skill will send any report to external addresses. - Local filesystem & code execution: Scripts import and instantiate adapters and run integration tests from /root/.openclaw/workspace. Running these scripts may execute arbitrary local code. Run the skill only in an isolated environment (disposable VM or container) and inspect the referenced local files (tests, adapters, MEMORY.md) first. - Missing artefacts: SKILL.md refers to requirements.txt and several test scripts that are not present in the manifest snippets. Confirm all referenced files exist and review their contents before running pip install or pytest. - Audit and limit token scopes: If you provide a GITHUB_TOKEN, scope it minimally (read-only) and avoid using a token with org-wide permissions. - Prefer manual confirmation: If possible, modify or configure the skill so that any data-sending action (email, uploads, ClawHub publish) requires explicit user confirmation and shows the exact diff/report to be sent. - Further checks that would increase confidence: full listing of any omitted/truncated script parts, the requirements.txt, the actual code that sends emails (to confirm destination and contents), and whether any code opens arbitrary network endpoints. If you cannot validate these, run the skill only in an isolated sandbox and avoid providing sensitive credentials.

Like a lobster shell, security has layers — review code before you run it.

latestvk970qze41mxw8qb4dpffnjpk39839g9j
159downloads
0stars
1versions
Updated 1d ago
v1.0.0
MIT-0

🦞 星型记忆架构自主进化计划 – 架构演进协调器

⚠️ 开发测试版本

此技能为架构演进协调器的参考实现,包含完整的五阶段演进提示词和理念级进化试点框架。

主要用途

  1. 为DeepSeek R1等AI助手提供星型记忆架构自主进化的执行指南
  2. 协调现有27个单功能插件的协同工作
  3. 支持理念级进化试点:分析外部项目(如NeverOnce)并生成融合方案

当前阶段:第5阶段(ClawHub发布与功能完善)进行中 系统健康度:100%(集成测试22/22通过) 核心指标:检索延迟<10ms,零循环依赖,25/27插件健康


📋 完整执行提示词

以下是为AI助手(DeepSeek R1)准备的完整执行提示词,定义了星型记忆架构从当前状态到理念级自主进化的五阶段演进路径:

# 🦞 星型记忆架构自主进化计划 – 给 DeepSeek R1 的执行提示词(2026‑03‑20 实际情况更新版)

## 📊 版本状态: 2026‑03‑20
## 🎯 当前阶段: 第 5 阶段(ClawHub 发布与功能完善)进行中
## 🚀 下一阶段: 第五阶段核心理念级进化试点准备

---(完整内容见下方)---

:由于篇幅限制,完整提示词超过7000字,包含:

  • 角色定义与约束条件
  • 五阶段详细实施计划(Phase 1-4.5已完成,Phase 5进行中)
  • 系统健康状态与性能指标
  • 技术债务跟踪与管理
  • 理念级进化试点框架

完整提示词可通过本技能的prompts/full_evolution_guide.md文件获取。


🛠️ 核心功能

1. 架构演进协调

  • 状态机约束:严格执行五阶段顺序,仅执行当前阶段允许的操作
  • 退化检测与修复:自动识别前阶段功能退化并进行修复
  • 健康监控:集成evolution-watcher的插件健康检查与报告生成

2. 理念级进化试点框架

  • 外部项目分析:从GitHub、arXiv等源提取核心理念
  • 功能对比匹配:将外部功能点与现有插件function_type元数据匹配
  • 融合方案生成:新插件草案或现有插件改造建议
  • 沙盒验证:复用evolution-watcher沙盒测试框架

3. 电子邮件报告集成

  • 自动报告evolution-watcher报告自动发送至johnson007.ye@gmail.com
  • 定制收件人:支持配置多个收件人邮箱
  • 报告格式:Markdown + HTML,支持丰富格式

🚀 快速开始

作为AI助手使用

# 加载本技能作为执行指南
# AI助手应严格遵循提示词中的阶段约束

# 检查当前阶段状态
python3 scripts/check_phase_status.py

# 运行理念级分析试点(以NeverOnce项目为例)
python3 scripts/analyze_external_project.py https://github.com/WeberG619/neveronce

作为独立协调器使用

# 安装依赖
pip install -r requirements.txt

# 运行架构健康检查
python3 scripts/architecture_health_check.py

# 生成演进报告
python3 scripts/generate_evolution_report.py --phase 5

📁 文件结构

architecture-evolution-coordinator/
├── SKILL.md                          # 本文件
├── prompts/
│   ├── full_evolution_guide.md       # 完整7000字执行提示词
│   ├── phase5_implementation.md      # 第五阶段详细实施方案
│   └── neveronce_analysis_template.md # NeverOnce项目分析模板
├── scripts/
│   ├── check_phase_status.py         # 阶段状态检查
│   ├── analyze_external_project.py   # 外部项目分析
│   ├── architecture_health_check.py  # 架构健康检查
│   └── generate_evolution_report.py   # 演进报告生成
├── templates/
│   ├── new_plugin_draft.md           # 新插件草案模板
│   └── fusion_proposal.md            # 融合方案模板
└── examples/
    └── neveronce_analysis_example.md # NeverOnce分析示例

🎯 理念级进化试点:NeverOnce项目分析

项目信息

  • 名称: NeverOnce
  • 描述: Persistent, correctable memory for AI. The memory layer that learns from mistakes.
  • GitHub: https://github.com/WeberG619/neveronce
  • 关键特性: 持久化记忆、可纠正性、从错误中学习、零依赖、跨平台

分析框架(预定义)

  1. 核心理念提取

    • 持久化记忆机制
    • 错误学习与纠正算法
    • 记忆衰减与强化策略
  2. 与现有架构对比

    • 对比memory-integration的持久化方案
    • 对比forgetting-curve的记忆衰减算法
    • 对比learning-coordinator的学习机制
  3. 融合机会识别

    • 可纠正记忆层作为新插件
    • 错误学习算法增强现有学习协调器
    • 跨平台支持集成到现有工具层

预期产出

  1. 分析报告:NeverOnce核心理念与现有架构对比
  2. 融合方案:具体代码变更建议或新插件草案
  3. 实施路线图:分阶段集成计划

🔧 技术要求

已实现保障

  • 沙盒测试:所有自动生成代码必须先通过沙盒测试
  • 用户确认:所有代码修改需展示diff和测试报告
  • 性能优化:缓存检索延迟<10ms
  • 元数据支持:完整插件function_type元数据

待实现功能(Phase 5)

  • 🔄 去重与版本追踪:外部项目数据库
  • 🔄 算法提取:从文档/代码提取算法信息
  • 🔄 理念引擎原型:完整"发现→解析→对比→生成→验证"流程

📊 系统集成

依赖插件

插件版本用途
evolution-watcherv0.6.2+监控、沙盒验证、报告生成
unified-query-gatewayv0.1.0+统一检索与缓存管理
memory-integrationv0.1.0+记忆同步与增强搜索
learning-coordinatorv0.1.0+学习机制协调

数据流

外部项目 → 理念提取 → 功能对比 → 融合方案 → 沙盒验证 → 用户确认 → 实施
          ↑                                          ↓
      元数据匹配                              报告生成 → 电子邮件

📝 配置说明

环境变量

# 电子邮件报告
export EVOLUTION_COORDINATOR_SENDER_EMAIL="your-email@gmail.com"
export EVOLUTION_COORDINATOR_SENDER_PASSWORD="your-app-password"
export EVOLUTION_COORDINATOR_RECIPIENT_EMAIL="johnson007.ye@gmail.com"

# GitHub API(可选)
export GITHUB_TOKEN="your_github_token"

# 架构路径
export OPENCLAW_WORKSPACE="/root/.openclaw/workspace"

配置文件

# config/coordinator_config.yaml
monitoring_sources:
  - type: github
    url: https://github.com/WeberG619/neveronce
    keywords: [memory, ai, learning, correction]
  
  - type: arxiv
    categories: [cs.AI, cs.LG]
    keywords: [memory, reinforcement learning]

analysis_depth: medium  # quick/medium/deep
output_format: markdown  # markdown/html/json

🧪 测试与验证

单元测试

# 运行所有测试
pytest tests/ -v

# 测试特定模块
pytest tests/test_idea_extraction.py
pytest tests/test_fusion_generation.py

集成测试

# 验证与evolution-watcher集成
python3 tests/integration/test_evolution_watcher_integration.py

# 验证报告生成与发送
python3 tests/integration/test_email_reporting.py

沙盒测试

# 运行理念分析沙盒测试
python3 scripts/sandbox_test_idea_analysis.py --project https://github.com/WeberG619/neveronce

📈 性能指标

指标目标值当前值状态
理念分析时间<30秒待测量
融合方案生成<60秒待测量
报告生成延迟<5秒待测量
电子邮件发送<10秒待测量
内存使用<100MB待测量

🚨 故障排除

常见问题

  1. 电子邮件发送失败

    • 检查环境变量配置
    • 验证SMTP服务器可达性
    • 检查发件人邮箱应用密码
  2. GitHub API限制

    • 配置GITHUB_TOKEN环境变量
    • 降低请求频率
    • 使用本地缓存
  3. 插件依赖缺失

    • 运行python3 scripts/check_dependencies.py
    • 安装缺失插件:clawhub install <plugin-name>
    • 更新插件版本

日志查看

# 查看协调器日志
tail -f logs/coordinator.log

# 查看理念分析日志
tail -f logs/idea_analysis.log

# 查看电子邮件日志
tail -f logs/email_sender.log

📄 许可证与贡献

许可证

MIT License - 详见LICENSE文件

贡献指南

  1. Fork本仓库
  2. 创建功能分支:git checkout -b feature/your-feature
  3. 提交更改:git commit -m 'Add some feature'
  4. 推送到分支:git push origin feature/your-feature
  5. 创建Pull Request

代码规范

  • 遵循PEP 8 Python代码规范
  • 所有函数必须有类型提示
  • 关键功能必须有单元测试
  • 公共API必须有文档字符串

📞 支持与反馈

问题报告

  • GitHub Issues: 创建新Issue
  • 电子邮件: 架构演进相关问题可发送至协调团队邮箱

功能请求

  1. 描述需求场景
  2. 提供具体用例
  3. 说明预期行为
  4. 提交功能请求Issue

紧急支持

对于生产环境关键问题,请联系维护团队。


🔄 更新历史

版本日期变更说明
v1.0.02026-03-20初始发布,包含完整五阶段演进提示词
v1.0.1计划中添加NeverOnce分析示例
v1.1.0计划中理念级进化引擎原型

最后更新: 2026-03-20 12:50 GMT+8

Comments

Loading comments...