Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Django Claw
v0.1.0Run Django management commands (migrate, showmigrations, makemigrations, check, version, logs, readonly) or Django ORM queries on any configured Django project.
⭐ 0· 381·0 current·0 all-time
bymanoj kumar@manojrammurthy
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description align with the shipped scripts: the skill needs a Django project path, venv and settings and provides management/ORM commands. However the setup injects DJANGO_* environment variables into ~/.openclaw/openclaw.json (the gateway config), which is broader than a local-skill config file and goes beyond merely storing the skill's own config.
Instruction Scope
SKILL.md enforces strict script dispatching (good for consistency) but the scripts execute arbitrary Python within your Django project context (run-query.sh appends user-provided code to a temp file and executes it). run-query.sh attempts to block access to some sensitive keywords with a simple grep but this is incomplete and can be bypassed. Also load-config.sh will automatically run the interactive setup wizard if config is missing — that can cause interactive prompts or unexpected writes when the agent is invoked autonomously.
Install Mechanism
No install/download steps — instruction-only with bundled scripts. Nothing is fetched from remote sources or extracted on install, which lowers install-time risk.
Credentials
The skill itself declares no required env vars, but the setup writes DJANGO_PROJECT_PATH, DJANGO_VENV_PATH, and DJANGO_SETTINGS_MODULE into the central ~/.openclaw/openclaw.json. Modifying the gateway-level environment config is disproportionate for a skill that otherwise could store config locally; it may have side effects for other skills or the gateway.
Persistence & Privilege
The skill does not request always:true, but it does persist configuration to ~/.openclaw/skills/django-claw/config.json and modifies ~/.openclaw/openclaw.json (gateway envs). Writing to gateway config is a cross-cutting change beyond the skill's own files and increases blast radius if the skill is compromised or misconfigured.
What to consider before installing
This skill largely matches its description, but there are a few things to consider before installing:
- Gateway config modification: The setup script injects DJANGO_* env vars into ~/.openclaw/openclaw.json (the gateway config). That changes a central config file, not just the skill's own directory. If you don't want global env changes, do not run the setup wizard or review/disable the injection lines in setup.sh first.
- Arbitrary code execution: The shell/run-query feature intentionally runs arbitrary Python inside your Django project. This is required for the skill's purpose, but it also means any code executed (including by an agent) can read/write data, secrets, or exfiltrate information. The script blocks some keywords via grep, but that is not a foolproof sanitizer.
- Interactive setup auto-run: If the skill is invoked without config, load-config.sh will run setup.sh automatically. That can lead to interactive prompts or unexpected writes during automated agent runs. Consider pre-configuring ~/.openclaw/skills/django-claw/config.json manually before granting agent access.
- Audit the files: Review setup.sh, load-config.sh, and run-query.sh before use. If you accept the skill, run the setup in a safe/test environment and inspect ~/.openclaw/openclaw.json after setup.
- Production caution: For production targets, enable read-only mode (django-claw readonly on) to block migrate/makemigrations/shell; still assume read-only does not prevent data reads. Avoid allowing autonomous model invocation for sensitive production projects unless you fully trust the skill and its maintainer.
- Additional information that would raise confidence: an official homepage or repository with maintainer identity, a reason why gateway env injection is necessary (and a toggle to disable it), stronger/sandboxed protections for run-query, and non-interactive setup options for automated environments.Like a lobster shell, security has layers — review code before you run it.
latestvk972qz2gdtnrhwrnj4ty18czw981wfp3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🐍 Clawdis
Binsbash, python3
