Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

ChatDev 2.0 Multi-Agent Team

v0.1.0

Invoke ChatDev ability units (workflows) via local API (port 6400). Use when the user needs specialized agent workflows like data visualization (from CSV), o...

0· 284·1 current·1 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for na-wen/chatdev.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "ChatDev 2.0 Multi-Agent Team" (na-wen/chatdev) from ClawHub.
Skill page: https://clawhub.ai/na-wen/chatdev
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install chatdev

ClawHub CLI

Package manager switcher

npx clawhub@latest install chatdev
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (invoke local ChatDev ability units on 127.0.0.1:6400) align with the SKILL.md: all endpoints are local and relate to browsing, running, uploading, and managing ability unit YAMLs.
!
Instruction Scope
Instructions explicitly allow uploading/updating ability unit YAMLs (which may include fields like base_url and api_key), instruct using absolute file paths as 'attachments', and tell the agent to move output directories into the working directory. While these are within a 'workflow management' scope, they introduce risks: (1) uploaded workflows could instruct the local service to call external services or include credentials; (2) attaching absolute paths enables referencing arbitrary local files (which the server may read); (3) moving output directories implies filesystem operations. The SKILL.md grants broad discretion to upload/modify workflows without guidance on safety or provenance of those YAMLs.
Install Mechanism
Instruction-only skill with no install steps or external downloads. This minimizes install-time risk because nothing is written or fetched by the skill itself.
Credentials
The skill declares no required env vars or credentials, which is coherent. However example upload payloads show placeholders like ${BASE_URL} and ${API_KEY} embedded in uploaded YAML content; that pattern could be used (by the server or workflows) to reference or resolve credentials, so absence of requested credentials in metadata does not eliminate the possibility that workflows will attempt to use or prompt for secrets.
Persistence & Privilege
The skill does not request permanent/always-on inclusion and does not install or modify other skills. It simply instructs the agent to talk to a local API. That is appropriate for its purpose.
What to consider before installing
This skill talks to a local service at 127.0.0.1:6400 and lets you run, upload, and modify YAML workflows. Before using it: (1) confirm you actually run a trusted ChatDev server on that port (unknown source/homepage is a red flag); (2) do not upload or run unreviewed YAMLs—they can instruct the local server to call external APIs or embed/require secrets; (3) avoid supplying absolute paths to sensitive files (attachments may cause the server to read them); (4) check what the local server does with outputs and whether workflows can exfiltrate data; and (5) if possible, run the service in an isolated environment and inspect workflow YAMLs (especially any that reference ${API_KEY}, ${BASE_URL} or other placeholders) before allowing execution. If you can provide the local server's code or documentation (how placeholders are resolved, network egress rules, and auth for the local API), that will materially improve confidence.

Like a lobster shell, security has layers — review code before you run it.

chatdevvk97d2es1s3f650p6k2sf6jdtc18331nvlatestvk97d2es1s3f650p6k2sf6jdtc18331nvmulti-agentvk97d2es1s3f650p6k2sf6jdtc18331nv
284downloads
0stars
1versions
Updated 1h ago
v0.1.0
MIT-0

ChatDev Ability Units

Ability units represent capability units. You can browse what's available, inspect required args, run them, or upload new ones. Use these endpoints when you need to invoke a predefined ability unit (e.g., paper review, data visualization) via the local API.

Run ability units via the local API and return final_message from the JSON response.

API endpoints

  1. Browse ability units
  1. Get ability unit raw content
  • Method: GET
  • URL: http://127.0.0.1:6400/api/workflows/<filename>/get
  • Purpose: fetch the raw YAML content for an ability unit file.
  • Example:
    curl --noproxy 127.0.0.1 -v \
      http://127.0.0.1:6400/api/workflows/test.yaml/get
    
  1. Get ability unit args
  • Method: GET
  • URL: http://127.0.0.1:6400/api/workflows/<ability_unit>.yaml/args
  • Purpose: fetch input parameter schema for an ability unit.
  • Example:
    curl --noproxy 127.0.0.1 -v -X GET \
      http://127.0.0.1:6400/api/workflows/test.yaml/args
    
  1. Run ability unit
  • Method: POST

  • URL: http://127.0.0.1:6400/api/workflow/run

  • Content-Type: application/json

  • SSE support: set Accept: text/event-stream to stream events (started, log, completed, error). Omit the header to get the normal JSON response.

  • Output: parse JSON and return final_message. If missing, report failure and include any error fields. After you get output_dir, move it to your working directory.

  • Available ability units:

    1. Paper Review
    • yaml_file: yaml_instance/paper_review.yaml
    • task_prompt: arXiv URL/ID or paper title.
    • Purpose: fetch content and deliver technical + writing reviews.
    • Example:
      curl --noproxy 127.0.0.1 -v -X POST http://127.0.0.1:6400/api/workflow/run \
        -H "Content-Type: application/json" \
        -H "Accept: text/event-stream" \
        -d '{
          "yaml_file": "yaml_instance/paper_review.yaml",
          "task_prompt": "https://arxiv.org/abs/1706.03762"
        }'
      
    1. Data Visualization
    • yaml_file: yaml_instance/data_visualization_basic.yaml
    • task_prompt: dataset description + analysis goals.
    • attachments: absolute paths to CSV files.
    • Purpose: profile, clean, plan 4-6 charts, iterate visualizations.
    • Example:
      curl --noproxy 127.0.0.1 -v -X POST http://127.0.0.1:6400/api/workflow/run \
        -H "Content-Type: application/json" \
        -d '{
          "yaml_file": "yaml_instance/data_visualization_basic.yaml",
          "task_prompt": "please analyze and visualize the data",
           "attachments": ["/Users/yufan/Projects/bugfix/ChatDev/sample_sales.csv"]
        }'
      
  1. Upload ability unit
  • Method: POST
  • URL: http://127.0.0.1:6400/api/workflows/upload/content
  • Content-Type: application/json
  • Format notes: filename should end with .yaml; content must be a valid YAML string that includes version, vars, and a graph with id, start, nodes, and edges (as in the example).
  • Tip: if uploads keep failing with format errors, call the "get ability unit raw content" endpoint to inspect an existing ability unit's structure and copy its format.
  • Example:
    curl --noproxy 127.0.0.1 -v -X POST \
      http://127.0.0.1:6400/api/workflows/upload/content \
      -H "Content-Type: application/json" \
      -d @- <<'EOF'
    {
      "filename": "test.yaml",
      "content": "version: 0.4.0\nvars: {}\ngraph:\n  id: paper_review\n  description: Three agents collaboratively review academic papers from different perspectives. Input can be an arxiv URL or paper title.\n  is_majority_voting: false\n  start:\n    - Paper Fetcher\n  nodes:\n    - id: Paper Fetcher\n      type: agent\n      config:\n        name: gpt-4o\n        provider: openai\n        role: |\n          You are a paper content fetcher.\n        base_url: ${BASE_URL}\n        api_key: ${API_KEY}\n      description: Fetches paper content from arxiv\n      context_window: 0\n  edges: []"
    }
    EOF
    
  1. Update ability unit
  • Method: PUT
  • URL: http://127.0.0.1:6400/api/workflows/<filename>/update
  • Content-Type: application/json
  • Format notes: same payload as upload (filename + YAML content string).
  • Example:
    curl --noproxy 127.0.0.1 -v -X PUT \
      http://127.0.0.1:6400/api/workflows/test.yaml/update \
      -H "Content-Type: application/json" \
      -d @- <<'EOF'
    {
      "filename": "test.yaml",
      "content": "version: 0.4.0\nvars: {}\ngraph:\n  id: paper_review\n  description: Update example.\n  is_majority_voting: false\n  start:\n    - Paper Fetcher\n  nodes:\n    - id: Paper Fetcher\n      type: agent\n      config:\n        name: gpt-4o\n        provider: openai\n        role: |\n          You are a paper content fetcher.\n        base_url: ${BASE_URL}\n        api_key: ${API_KEY}\n      description: Fetches paper content from arxiv\n      context_window: 0\n  edges: []"
    }
    EOF
    
  1. Rename ability unit
  • Method: POST
  • URL: http://127.0.0.1:6400/api/workflows/<filename>/rename
  • Content-Type: application/json
  • Body: { "new_filename": "new_name.yaml" }
  • Example:
    curl --noproxy 127.0.0.1 -v -X POST \
      http://127.0.0.1:6400/api/workflows/test.yaml/rename \
      -H "Content-Type: application/json" \
      -d '{"new_filename":"renamed.yaml"}'
    
  1. Copy ability unit
  • Method: POST
  • URL: http://127.0.0.1:6400/api/workflows/<filename>/copy
  • Content-Type: application/json
  • Body: { "new_filename": "copy.yaml" }
  • Example:
    curl --noproxy 127.0.0.1 -v -X POST \
      http://127.0.0.1:6400/api/workflows/test.yaml/copy \
      -H "Content-Type: application/json" \
      -d '{"new_filename":"test-copy.yaml"}'
    
  1. Delete ability unit
  1. List local tools (function_calling)

Tools hot updates

Local function tools are managed via the same backend (port 6400).

Endpoints:

  • List local tools: GET http://127.0.0.1:6400/api/tools/local
  • Create/overwrite local tool file: POST http://127.0.0.1:6400/api/tools/local

Create example:

curl --noproxy 127.0.0.1 -X POST http://127.0.0.1:6400/api/tools/local \
  -H "Content-Type: application/json" \
  -d '{
    "filename": "add.py",
    "content": "def add(a: int, b: int) -> dict:\n    return {\"result\": a + b}\n",
    "overwrite": true
  }'

YAML example (local function_calling):

tooling:
  - type: function
    config:
      tools:
        - name: add

Common scenarios and tool suggestions

  • If the agent needs to search the web, use web_search.
  • If the agent needs to fetch a URL's content, use read_webpage_content.
  • If the agent needs to inspect local files, use describe_available_files and list_directory.
  • If the agent needs to read a file snippet, use read_text_file_snippet or read_file_segment.
  • If the agent needs to write output files, use save_file.

Advanced Workflow Templates

Below are advanced YAML templates you can copy and adapt. They cover debate loops, subgraph reuse, conditional edges, and selective payload routing.

1) Two-Agent Debate Loop with Judge Stop Criteria

version: 0.4.0
vars: {}
graph:
  id: debate_loop
  description: Two agents debate until the judge outputs "Verdict: STOP".
  is_majority_voting: false
  start:
    - Topic
  nodes:
    - id: Topic
      type: passthrough
      config: {}
    - id: Pro
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          You are the PRO debater. Respond with arguments and counterpoints.
    - id: Con
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          You are the CON debater. Respond with arguments and counterpoints.
    - id: Judge
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          Evaluate the debate. Output:
          Score: <0-1>
          Notes: <brief>
          Verdict: CONTINUE|STOP
    - id: Final
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          Produce the final summary of the debate and recommendation.
  edges:
    - from: Topic
      to: Pro
      keep_message: true
    - from: Topic
      to: Con
      keep_message: true
    - from: Pro
      to: Judge
    - from: Con
      to: Judge
    - from: Judge
      to: Pro
      condition: need_reflection_loop
    - from: Judge
      to: Con
      condition: need_reflection_loop
    - from: Judge
      to: Final
      condition: should_stop_loop

2) Subgraph Reuse + Selective Payload Passing

version: 0.4.0
vars: {}
graph:
  id: parent_with_subgraph
  description: Uses a subgraph and only forwards the "Summary" section.
  start:
    - Request
  nodes:
    - id: Request
      type: passthrough
      config: {}
    - id: ResearchSubgraph
      type: subgraph
      config:
        type: file
        config:
          path: "subgraphs/deep_research_executor_sub.yaml"
    - id: Writer
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          Write the final report using only the provided Summary.
  edges:
    - from: Request
      to: ResearchSubgraph
      keep_message: true
    - from: ResearchSubgraph
      to: Writer
      process:
        type: regex_extract
        config:
          pattern: "Summary:\\s*(.*)"
          group: 1
          multiline: true
          dotall: true
          on_no_match: pass

3) Conditional Routing + Minimal Payload

version: 0.4.0
vars: {}
graph:
  id: router_with_conditions
  description: Route to different nodes based on tags; forward only CONTENT block.
  start:
    - Router
  nodes:
    - id: Router
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          Decide the route. Output exactly:
          ROUTE: QA|REPORT
          CONTENT: <payload to forward>
    - id: QA
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          Answer the question concisely.
    - id: REPORT
      type: agent
      config:
        provider: openai
        base_url: ${BASE_URL}
        api_key: ${API_KEY}
        name: gpt-4o
        role: |
          Write a structured report.
  edges:
    - from: Router
      to: QA
      condition:
        type: keyword
        config:
          any: ["ROUTE: QA"]
      process:
        type: regex_extract
        config:
          pattern: "CONTENT:\\s*(.*)"
          group: 1
          dotall: true
          on_no_match: drop
    - from: Router
      to: REPORT
      condition:
        type: keyword
        config:
          any: ["ROUTE: REPORT"]
      process:
        type: regex_extract
        config:
          pattern: "CONTENT:\\s*(.*)"
          group: 1
          dotall: true
          on_no_match: drop

Tips

  • Any workflow YAML can be used as a subgraph to compose more complex tasks, including existing ability units/workflows. Example:
    - id: Research Subgraph
      type: subgraph
      config:
        type: file
        config:
          path: "yaml_instance/deep_research_v1.yaml"
    
  • Ensure that all generated artifacts are output to your workspace file paths whenever possible
  • Ensure that all agents’ roles are concise, sophisticated, and equipped with sufficient tools

Comments

Loading comments...