Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Claude Code Pro

v1.1.0

Token-efficient Claude Code workflow. Other skills burn tokens polling tmux every 30s — this one uses completion callbacks and only checks when notified. Obs...

0· 902·7 current·7 all-time
bySway Liu@swaylq
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the implementation: scripts create isolated tmux sessions (tmux -L cc), start a local Claude CLI process, and provide monitoring/send/list/stop helpers. Required binaries (tmux, bash, optional claude) are appropriate for the stated workflow.
!
Instruction Scope
Runtime instructions and scripts operate only on local tmux sessions and files, which fits the purpose, but the workflow encourages using a completion callback (openclaw system event) and—critically—defaults to auto mode that runs 'claude' with '--dangerously-skip-permissions'. That setting allows the started Claude process to run tools without confirmation and may cause arbitrary actions in the target workdir. The SKILL.md/README explicitly promotes skipping permission prompts, which expands the agent's effective scope beyond passive monitoring.
Install Mechanism
This is instruction- and script-based with no external downloads or installers. No install spec is provided; the files are plain bash scripts that will be written when the skill is installed. No network-based install URLs or archive extraction were observed.
Credentials
The skill declares no required environment variables or secrets and the scripts don't request credentials. However, it relies on an external 'claude' CLI which may itself use credentials or network access configured outside the skill; that is expected but worth being aware of.
!
Persistence & Privilege
The skill does not set always:true and does not modify other skills. However, its default behavior (start.sh default MODE='auto') instructs the Claude CLI to skip permission prompts ('--dangerously-skip-permissions'), effectively granting the spawned Claude session high autonomy over the working directory and tools. This is a design/privilege decision that significantly increases risk if used in untrusted or non-version-controlled repos.
What to consider before installing
This skill is functionally what it claims: it manages isolated tmux sessions and runs the local 'claude' CLI to save supervision tokens. Key things to consider before installing or running it: - Default auto mode is risky: start.sh defaults to --mode auto and the code sends '--dangerously-skip-permissions' to the claude CLI. That allows the spawned Claude process to run tools and make changes without interactive permission prompts. Use --mode plan or change the default to require permission for any environment where you care about unreviewed actions. - Run only in trusted, version-controlled project directories (or in an isolated container) because the agent will be given autonomy to operate on files in the workdir. - The skill expects the 'claude' CLI to be present and configured; verify how your Claude CLI stores credentials and ensure those credentials are scoped appropriately. - The skill relies on you appending an 'openclaw system event' callback in the task so the agent is notified on completion; if tasks don’t run that, the fallback behavior is a poll after 15 minutes. The callback is not enforced by the scripts. - If you want lower risk, edit start.sh to default to plan mode (remove or change the --dangerously-skip-permissions flag) and audit the scripts before use. Consider running the skill in a disposable container or VM for initial tests. Overall: coherent with purpose but the default 'skip permissions' behavior elevates risk — treat it as potentially dangerous unless you intentionally accept that autonomy.

Like a lobster shell, security has layers — review code before you run it.

latestvk979dxxsf8zgmqb9hb596vy1kh81snq7

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Clawdis
OSmacOS · Linux
Binstmux, bash
Any binclaude

Comments