Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Builtin Tools
v1.0.0跨平台基础工具集 — 16 个独立可组合的 Python 脚本,替代 Agent 平台缺失的基础工具能力。 文件系统(浏览/搜索/读写/替换/删除)、内容搜索(正则)、网络(搜索/抓取/预览)、 运行时安装、持久化记忆、定时任务、任务管理。 纯 Python 标准库,零外部依赖,跨 Windows/macOS/L...
⭐ 0· 19·0 current·0 all-time
by波动几何@wangjiaocheng
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description advertise cross-platform small utilities (filesystem, search, web fetch, install, memory, tasks) and the package includes scripts that implement exactly those capabilities. Required env/config/credentials are none, which aligns with a pure-Python toolset.
Instruction Scope
SKILL.md and scripts allow broad operations: arbitrary shell command execution (execute_command mode 'command'), reading/writing/deleting files, recursive searches, web fetching, and runtime binary downloads. This is consistent with the advertised purpose, but these capabilities are high-privilege: the agent (or a caller) can read/write most files, execute arbitrary shell commands, and download/expand archives. The delete_file script blocks literal root and user home deletion, but most other filesystem paths are writable by the skill. execute_command uses a shell (sh -c or PowerShell -Command), so commands are interpreted by the platform shell.
Install Mechanism
No install spec; skill is instruction + bundled Python scripts (no remote install). The only runtime downloader is install_binary.py which pulls from official python.org and nodejs.org URLs and extracts archives — expected for a runtime installer and documented in SKILL.md.
Credentials
The skill declares no required environment variables or credentials. Scripts copy os.environ when spawning subprocesses and accept optional env overrides for executed commands, which is normal for a tool that runs local commands. There are no hard-coded secrets or requests for unrelated cloud credentials.
Persistence & Privilege
always is false and the skill does not autonomously modify other skills or global agent config. It persists files under user home (e.g., ~/.builtin-tools, ~/.workbuddy memory dir) and can write todo/memory files; this matches the stated persistent memory feature and is scoped to the user's filesystem rather than system-wide privilege escalation.
Assessment
This package is internally coherent for a local ’builtin tools’ toolkit, but it grants powerful local privileges: it can read/write/delete files, run arbitrary shell commands, fetch arbitrary URLs, and download/extract binaries. Only install or enable it if you trust the author and the code. Consider: run it in a sandbox or isolated account first; disable autonomous invocation if your platform allows it (so an agent cannot call 'command' mode without your approval); review the remaining unshown scripts (web_search, etc.) if possible; and be cautious when giving it tasks that involve sensitive files or secrets.Like a lobster shell, security has layers — review code before you run it.
latestvk977d1r04ctraycspk1wefc6h984syyj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
