Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Chmod Tool

v1.0.0

Change file permissions using symbolic or numeric modes.

0· 36·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for dinghaibin/chmod-tool.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Chmod Tool" (dinghaibin/chmod-tool) from ClawHub.
Skill page: https://clawhub.ai/dinghaibin/chmod-tool
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install chmod-tool

ClawHub CLI

Package manager switcher

npx clawhub@latest install chmod-tool
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
Name/description say 'symbolic or numeric modes', recursive and reference-file support; the packaged script only accepts two positional args (mode and file) and parses mode as an octal integer — symbolic modes (e.g. '+x'), '-R', and reference-file behavior are not implemented.
!
Instruction Scope
SKILL.md shows examples using symbolic modes and recursive usage that will not work with scripts/chmod.py. Following the documented examples will produce errors or unexpected behavior; the instructions therefore mislead the agent about what commands to run and what effects to expect.
Install Mechanism
No install spec; this is instruction+small script only, so nothing is being downloaded or written to disk at install time beyond the included files.
Credentials
No environment variables, credentials, or config paths are requested — appropriate for a simple chmod utility.
Persistence & Privilege
always is false and the skill does not request elevated persistence. Note that the skill can be invoked autonomously by default (disable-model-invocation is false), which is normal for skills.
What to consider before installing
The SKILL.md and examples promise features (symbolic modes like '+x', recursive -R, reference-file) that the included Python script does not implement — it only accepts an octal mode and a single path. This looks like sloppy or incorrect packaging rather than overtly malicious code, but you should not rely on the documented behavior. If you need symbolic/recursive behavior, use the system chmod or fix/replace the script. Before installing or allowing the agent to run this skill: (1) review or test scripts/chmod.py in a safe directory to confirm behavior; (2) update SKILL.md to match actual capabilities or update the script to implement the advertised features; (3) avoid granting the agent permission to run this tool on sensitive system paths until you're confident it behaves as expected. If you expected symbolic/recursive/reference support, treat this skill as unusable until corrected.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e1fgwpp46789ze9nwbnn9nh85n6fa
36downloads
0stars
1versions
Updated 17h ago
v1.0.0
MIT-0

Chmod Tool - File Permissions

Modify file read/write/execute permissions with symbolic or octal modes.

Quick Start

chmod-tool +x script.sh

Features

  • Symbolic mode (u+x, g-w)
  • Octal mode (755, 644)
  • Recursive (-R)
  • Reference file

Examples

chmod-tool +x script.sh
chmod-tool 755 myfile
chmod-tool -R 644 docs/

See Also

  • Related documentation: man chmod (if available)

Comments

Loading comments...