Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Backup Strategy

v1.0.0

备份策略助手。用于制定数据备份策略、设计备份方案、规划恢复流程。当需要制定备份方案、设计灾备策略时触发。

0· 92·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for yongjie666888/backup-strategy.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Backup Strategy" (yongjie666888/backup-strategy) from ClawHub.
Skill page: https://clawhub.ai/yongjie666888/backup-strategy
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install backup-strategy

ClawHub CLI

Package manager switcher

npx clawhub@latest install backup-strategy
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description (backup strategy and recovery planning) align with the SKILL.md content: templates, retention policies, backup/restore scripts, and monitoring guidance. The material is appropriate for a 'backup strategy' helper.
Instruction Scope
SKILL.md contains runnable script examples that reference system paths (/backup, /var/log, /data/app) and commands (mysqldump, rsync, aws s3 sync, find -exec rm -rf). Those are expected for backup instructions, but the scripts include unsafe patterns (hardcoded MYSQL_PASS, find ... -exec rm -rf without additional safeguards) and point at an external S3 bucket (s3://mybackup) which would transmit user data off-host if executed. The instructions do not explicitly instruct agents to harvest unrelated system secrets, but the provided examples could lead users or an agent to run privileged operations against system files or external endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files — minimal install risk. Nothing is downloaded or written to disk by the skill package itself.
Credentials
The skill declares no required environment variables or credentials, yet its examples implicitly require credentials/tools (MySQL credentials, AWS CLI credentials) and hardcode a password (MYSQL_PASS="password"). That mismatch isn't necessarily malicious, but it is a security risk: examples encourage embedding secrets in scripts and syncing to an unspecified remote bucket without discussing credential management, IAM roles, encryption, or bucket ownership.
Persistence & Privilege
Skill is not always-enabled and does not request persistent system presence or modify other skills/configurations. Autonomous invocation is allowed by default (platform normal), but there is no privileged flag like always:true.
What to consider before installing
This skill appears to be a legitimate template for backup strategy, but review and modify the examples before using them: - Do not use hardcoded credentials (remove MYSQL_PASS="password"); use vaulted secrets, environment variables, or IAM roles and document how to supply them securely. - Verify ownership of any remote bucket (s3://mybackup) before syncing — otherwise you may upload backups to an uncontrolled external location. Prefer account-specific bucket names, enforce server-side or client-side encryption, and use least-privilege IAM policies. - Replace unsafe delete patterns with safer retention logic (confirm paths, test in staging, log actions) to avoid accidental data loss. - Run all scripts in a non-production environment first and perform restore drills to validate procedures. - Consider adding notes about credential/storage rotation, encryption of backups, access controls, and monitoring/alerting for backup failures. If you want to let an automated agent use this skill, ensure the agent is explicitly given only scoped credentials and test behavior in a controlled environment. If you need, I can point out specific lines in the SKILL.md to change to make the examples safer.

Like a lobster shell, security has layers — review code before you run it.

latestvk971bdz48f5ffdf1j67ganps6983gg09
92downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

备份策略助手

备份类型

类型说明频率保留时间
全量备份备份所有数据每周一次4周
增量备份备份新增数据每天7天
差异备份备份与上次全量差异每天7天
实时备份数据变化即时同步实时-

备份策略模板

# 数据备份策略

版本:V1.0
更新日期:YYYY-MM-DD
维护人:XXX

---

## 1. 备份目标

### 1.1 备份范围
| 数据类型 | 重要程度 | 数据量 | 说明 |
|----------|----------|--------|------|
| 业务数据 | 关键 | XX GB | 核心业务数据 |
| 用户数据 | 关键 | XX GB | 用户信息 |
| 配置数据 | 重要 | XX MB | 系统配置 |
| 日志数据 | 一般 | XX GB | 操作日志 |
| 代码仓库 | 重要 | XX GB | Git仓库 |

### 1.2 恢复时间目标(RTO)
- 关键业务:≤1小时
- 一般业务:≤4小时

### 1.3 恢复点目标(RPO)
- 关键业务:≤15分钟
- 一般业务:≤1小时

---

## 2. 备份策略

### 2.1 数据库备份
| 备份类型 | 执行时间 | 保留策略 |
|----------|----------|----------|
| 全量备份 | 每周日 02:00 | 保留4周 |
| 差异备份 | 每天 02:00 | 保留7天 |
| 日志备份 | 每15分钟 | 保留7天 |

### 2.2 文件备份
| 备份类型 | 执行时间 | 保留策略 |
|----------|----------|----------|
| 全量备份 | 每周日 03:00 | 保留4周 |
| 增量备份 | 每天 03:00 | 保留7天 |

### 2.3 配置备份
| 备份类型 | 执行时间 | 保留策略 |
|----------|----------|----------|
| 变更时备份 | 配置变更时 | 保留10个版本 |

---

## 3. 备份存储

### 3.1 存储架构

本地磁盘(每日) ↓ 本地备份服务器(每周) ↓ 异地云存储(每月)


### 3.2 存储位置
| 层级 | 位置 | 用途 |
|------|------|------|
| L1 | 应用服务器本地 | 快速恢复 |
| L2 | 备份服务器 | 本地冗余 |
| L3 | 云存储(OSS/S3) | 异地容灾 |

### 3.3 存储容量规划
| 数据类型 | 日增量 | 月总量 | 存储规划 |
|----------|--------|--------|----------|
| 数据库 | XX GB | XX GB | 留100%余量 |
| 文件 | XX GB | XX GB | 留50%余量 |

---

## 4. 备份脚本示例

### MySQL备份脚本
```bash
#!/bin/bash
# MySQL全量备份脚本

DATE=$(date +%Y%m%d)
BACKUP_DIR="/backup/mysql"
MYSQL_USER="backup"
MYSQL_PASS="password"
DATABASE="myapp"

# 创建备份目录
mkdir -p ${BACKUP_DIR}/${DATE}

# 执行备份
mysqldump -u${MYSQL_USER} -p${MYSQL_PASS} \
  --single-transaction \
  --routines --triggers \
  ${DATABASE} | gzip > ${BACKUP_DIR}/${DATE}/${DATABASE}.sql.gz

# 删除7天前的备份
find ${BACKUP_DIR} -type d -mtime +7 -exec rm -rf {} \;

# 记录日志
echo "[$(date)] Backup completed: ${DATABASE}" >> /var/log/backup.log

文件备份脚本

#!/bin/bash
# 文件增量备份脚本

DATE=$(date +%Y%m%d)
SOURCE_DIR="/data/app"
BACKUP_DIR="/backup/files"
REMOTE_BUCKET="s3://mybackup"

# 创建备份目录
mkdir -p ${BACKUP_DIR}/${DATE}

# 增量备份(使用rsync)
rsync -av --delete \
  ${SOURCE_DIR}/ \
  ${BACKUP_DIR}/${DATE}/

# 同步到云存储
aws s3 sync ${BACKUP_DIR}/${DATE}/ ${REMOTE_BUCKET}/${DATE}/

# 记录日志
echo "[$(date)] File backup completed" >> /var/log/backup.log

5. 恢复流程

5.1 数据库恢复

# 全量恢复
gunzip < backup.sql.gz | mysql -u root -p database

# 基于时间点恢复
mysqlbinlog --stop-datetime="2024-01-01 10:00:00" binlog.000001 | mysql

5.2 文件恢复

# 从本地恢复
rsync -av /backup/files/20240101/ /data/app/

# 从云存储恢复
aws s3 sync s3://mybackup/20240101/ /data/app/

6. 备份验证

6.1 验证清单

  • 备份任务执行成功
  • 备份文件完整性校验(MD5)
  • 备份可恢复(定期演练)
  • 备份通知发送成功

6.2 恢复演练

频率内容执行人
每季度完整恢复演练DBA
每月数据抽样恢复测试运维
每周备份完整性检查自动

7. 备份监控

监控项阈值告警方式
备份任务状态失败短信/邮件
备份大小异常变化>50%邮件
存储空间使用>80%邮件
恢复演练未执行>90天邮件

Comments

Loading comments...