Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Cool Agent Tools

v1.0.0

AI Agent 通用工具集 - 提供系统监控、日志分析、进程管理、文件处理、网络诊断等实用命令封装,帮助 agent 高效完成日常运维和数据处理任务。

0· 146·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for chuangyinbot-boop/cool-agent-tools.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Cool Agent Tools" (chuangyinbot-boop/cool-agent-tools) from ClawHub.
Skill page: https://clawhub.ai/chuangyinbot-boop/cool-agent-tools
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install cool-agent-tools

ClawHub CLI

Package manager switcher

npx clawhub@latest install cool-agent-tools
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the provided commands (system monitoring, logs, processes, network). However, the skill declares no required binaries or config yet the instructions rely on many standard system tools (curl, docker, netstat/ifconfig/ip, journalctl, pkill/kill, tar, find, du, etc.). This omission is sloppy and should be clarified but is not inherently malicious.
!
Instruction Scope
SKILL.md directly instructs the agent to execute system-level commands including destructive operations (e.g., find /var/log -name "*.log" -mtime +7 -delete, pkill -f python, kill -9). There are no safeguards, confirmation steps, or policies about when to run destructive actions. The instructions give broad discretion to run commands on the host, which increases risk if the agent is allowed to act autonomously.
Install Mechanism
Instruction-only skill with no install spec or code files. This minimizes supply-chain risk because nothing is written or downloaded by the skill itself.
Credentials
The skill requests no credentials or environment variables, which is appropriate for local sysadmin tooling. Note: it does assume access to host filesystem and container runtime (docker) — reasonable for the stated purpose but should be acknowledged to users who expect limited agent permissions.
Persistence & Privilege
always:false (no forced presence). The skill permits model invocation (normal), which combined with the instruction scope (destructive commands) increases risk if the agent is allowed to act autonomously. The skill does not attempt to modify other skills or system-wide configurations.
What to consider before installing
This skill is coherent for system administration, but it contains high-impact commands (delete logs, kill processes) and omits declaring which system tools it needs. Before installing: (1) only allow human-in-the-loop invocation or require explicit confirmations for destructive actions; (2) run the agent in a restricted/test environment with limited privileges (avoid root) and backups available; (3) ask the author to document required binaries and to replace broad commands (e.g., pkill -f python, find ... -delete) with safer, interactive alternatives or add confirmation/whitelisting; (4) if you must allow autonomous runs, add strict policies/logging and limit which commands the agent may execute. If you cannot enforce these controls, treat the skill as risky and avoid installing it on production hosts.

Like a lobster shell, security has layers — review code before you run it.

latestvk971d9edqsh7v67j7q9n2f7kjn856qwf
146downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

agent-tools

AI Agent 通用工具集,让 CooL神 拥有瑞士军刀般的实用能力。

工具清单

🔍 系统监控

命令说明
top查看系统进程/资源占用
htop交互式进程查看(需安装)
df -h磁盘空间使用情况
du -sh *当前目录各文件夹大小
free -h内存使用情况
uptime系统运行时间和负载

🌐 网络诊断

命令说明
curl -I <url>检查 URL 可达性(只取 header)
ping -c 4 <host>测试网络连通性
nslookup <domain>DNS 解析查询
netstat -tuln查看监听端口
ifconfig / ip addr查看网络接口

📁 文件处理

命令说明
find . -name "*.log" -mtime -77天内修改过的日志文件
find . -size +100M查找大于 100MB 的文件
ls -laSh按大小排序显示文件
wc -l <file>统计文件行数
grep -r "error" ./logs/递归搜索日志中的错误
tail -f <file>实时跟踪文件变化
tar -czvf archive.tar.gz ./dir/压缩目录
tar -xzvf archive.tar.gz解压 tar.gz

🐳 容器/Docker

命令说明
docker ps查看运行中的容器
docker ps -a查看所有容器(含停止)
docker logs --tail 100 <container>查看容器最近日志
docker images查看镜像列表
docker system df磁盘使用情况

📊 日志分析

命令说明
journalctl -u <service> --since "1 hour ago"查看服务最近日志
dmesg | tail -50内核日志
tail -n 100 /var/log/syslog系统日志

⚙️ 进程管理

命令说明
pkill <name>按名称杀死进程
pgrep -f <name>查找进程 PID
kill -9 <pid>强制终止进程
nohup <cmd> &后台运行(断开 SSH 仍保持)

🛠️ Git 操作

命令说明
git status查看工作区状态
git log --oneline -10最近 10 次提交
git diff查看未暂存的修改
git branch -a查看所有分支

🔧 实用脚本

# 清理旧日志(保留最近 7 天)
find /var/log -name "*.log" -mtime +7 -delete

# 找出占用空间最大的目录(深度 2)
du -h --max-depth=2 / | sort -hr | head -20

# 杀掉所有名为 python 的进程
pkill -f python

# 实时查看 access.log 最新 50 行
tail -50f /var/log/nginx/access.log

# 检查 URL 是否返回 200
curl -s -o /dev/null -w "%{http_code}" https://example.com

使用方式

agent-tools 不需要特殊触发指令。在分析系统问题、执行运维任务时,直接调用对应命令即可。

示例场景:

  • "帮我看看服务器负载" → 执行 uptime && free -h
  • "检查网站能不能访问" → 执行 curl -I https://example.com
  • "找出哪些文件占空间" → 执行 du -sh * 按大小排序
  • "清理 7 天前的日志" → 执行 find ... -mtime +7 -delete

让 CooL神 成为一个真正的全能助手

Comments

Loading comments...