Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Deploydevnlu
v1.0.4Deploys the application to the SupplyWhy development EC2 server via SSH, updates image tag if provided, applies Kubernetes deployment, and verifies rollout s...
⭐ 0· 603·2 current·2 all-time
byYu Song@yusong-7456
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The code and SKILL.md both describe deploying to the SupplyWhy EC2 via SSH and running kubectl, which is coherent with the name/description. However the SKILL.md expects an IMAGE_TAG argument ($ARGUMENTS) while the code instead parses a deployment environment (production/staging/dev) from Slack text and uses that value as the image tag — a mismatch in inputs. The skill also hardcodes an ECR repo/account in the sed command, which is specific but consistent with a deployment tool for this application.
Instruction Scope
The instructions and code tell the agent to add and use a local private SSH key (~/.ssh/supplywhy-dev-key.pem) and run multiple ssh commands on a host named supplywhy-dev-master. That requires access to the user's private key and the agent's ssh-agent. The code accepts NLP-parsed environment text and injects it into shell commands without explicit sanitization, which introduces a command-injection risk if the parsed value is unexpected. The SKILL.md and code differ about how an image tag is provided (ARGUMENTS vs parsed environment), creating ambiguity about what will actually be used.
Install Mechanism
There is no install spec and only a small index.js implementation; nothing is downloaded or written by an installer. This is lower risk from an installation perspective.
Credentials
No environment variables or credentials are declared in metadata, yet the skill requires and will use a specific SSH private key file in the user's home (~/.ssh/supplywhy-dev-key.pem). Requiring access to a private key is proportionate for a deploy tool, but the omission from declared requirements and the hardcoded key path means the skill implicitly expects access to sensitive local secrets. Additionally, the hardcoded ECR repo/account is specific and may not be appropriate for all users.
Persistence & Privilege
The skill is not always-enabled and does not request system-wide persistence or modify other skills. It runs when invoked (normal behavior) and does not declare elevated platform privileges.
What to consider before installing
Before installing, consider these precautions:
- Treat this as potentially dangerous until you audit it: the skill will attempt to add and use a local SSH private key (~/.ssh/supplywhy-dev-key.pem). Only proceed if you trust the skill source and you have a dedicated deploy key (not your personal account key).
- The SKILL.md and code disagree about how the image/tag is supplied. Test in a safe environment to confirm which input (an explicit tag argument vs. a parsed environment string) will be used.
- The code injects the parsed environment directly into shell commands (sed/ssh). Malformed or unexpected NLP output could allow command injection. Prefer sanitizing inputs or restricting allowed values to {production,staging,dev} before running commands.
- Verify the hardcoded ECR account (590183820143) and the target host name (supplywhy-dev-master) are appropriate for your org; otherwise the skill could target the wrong resources.
- Use a limited-scope deploy key with restricted access and rotate it if the key is ever exposed. Run the deployment steps manually once from a machine with only the deploy key to confirm behavior before allowing the skill to run automatically.
- If you cannot audit the code or don't trust the author, do not install the skill on a machine that holds other SSH keys or sensitive credentials.
If you want to proceed but reduce risk: modify the code to validate/sanitize parsed environment values, require explicit configuration of the SSH key path in metadata, and use a dedicated, least-privilege deploy key.Like a lobster shell, security has layers — review code before you run it.
latestvk977y4hv08qj7waga7rt3bqxen81qdww
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
