Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Deep Coding
v0.0.2Deep coding multi-agent development system. Use when the user wants to build software projects using the Orchestrator to Builder to Reviewer workflow, mentio...
⭐ 0· 13·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill claims to provide a multi-agent orchestration workflow and its files/instructions implement that. However the SKILL.md and references assume the ability to run Playwright (Node), spawn agents that execute code, and run a Python dashboard; the metadata declares no required binaries or env vars. Not declaring required runtimes (python3, node, npm, playwright) is an incoherence: a legitimate multi-agent harness would list these dependencies.
Instruction Scope
SKILL.md instructs agents and humans to read/write a project tree (harness-projects/*), create project-state.json, spawn Builders/Reviewers, serve projects via HTTP and run end-to-end tests (Playwright). Those actions are expected for the stated purpose, but they grant broad filesystem and execution scope: Reviewers/Builders are instructed to run project code and serve it over HTTP. The instructions do not warn about secrets in project directories, nor do they constrain network exposure. Also they require use of platform primitives (sessions_spawn, sessions_send) whose security/privilege/side-effects are not documented here.
Install Mechanism
There is no install spec (instruction-only with bundled assets). That lowers installation risk, but assets include a Python HTTP server (assets/server.py) intended to be copied/run. The package doesn't declare that running server.py will start an HTTP server exposing project files and logs; this operational side-effect should have been made explicit and packaged with appropriate binding/ACL instructions.
Credentials
The skill requests no environment variables or credentials, which is consistent with not needing external APIs. However the instructions implicitly require system binaries (python3, node/npm, Playwright) and agent runtime access to run arbitrary code; these are not declared. The absence of declared runtime/platform requirements is a proportionality mismatch — the skill will not function as described without additional system capabilities.
Persistence & Privilege
always:false and no install-time persistent hooks are declared. The skill does write files to harness-projects/ when used (project-state.json, logs, requests/done), which is normal for this purpose. It does not request to modify other skills or global agent settings in the manifest.
What to consider before installing
What to check before using this skill:
- Dependencies: The SKILL.md expects you to run a Python server and to run Playwright-based E2E tests (Node + Playwright). The package metadata does not list these binaries. Do not assume they exist — verify and install (in a sandbox) first.
- Inspect assets/server.py carefully before running. It serves files from the directory where you run it and likely binds to all network interfaces by default. This can expose project files (including secrets, keys, node_modules, config files) to the network. If you run it, limit binding to localhost (127.0.0.1) and run it in a directory that contains only safe project files.
- Path traversal / file exposure: The server constructs file paths from request URLs. Verify its send_file implementation and test whether crafted requests can access files outside the intended directory. Run in an isolated environment until you confirm it's safe.
- Execution surface: Reviewers/Builders are instructed to run and serve generated project code. That means arbitrary code execution: only run this on machines/environments where executing untrusted/generated code is acceptable (use containers or VMs).
- Platform primitives and privileges: The orchestrator instructions assume platform features (sessions_spawn, agentId:qoder, runtime:acp). Confirm how those operate on your platform and whether they will run code remotely or with network access.
- Hardening suggestions: run server.py in a constrained environment (container/VM), change binding to 127.0.0.1, remove any secrets from the project directory, explicitly install Playwright and Node in isolated envs, and test the server's file-serving behavior for path traversal before exposing it to networks.
Given these mismatches and the potential for accidental data exposure or untrusted code execution, treat the skill as 'suspicious' until you validate and harden the included server and runtime assumptions.Like a lobster shell, security has layers — review code before you run it.
latestvk973st07wzzvr6c0nekdg62fq984cbnk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
