Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Exploration Mode Skill

v1.0.0

Autonomously executes research, maintenance, security, reflection, knowledge, and optimization tasks during idle time.

0· 184·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for yzh0916/exploration-mode-skill.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Exploration Mode Skill" (yzh0916/exploration-mode-skill) from ClawHub.
Skill page: https://clawhub.ai/yzh0916/exploration-mode-skill
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install exploration-mode-skill

ClawHub CLI

Package manager switcher

npx clawhub@latest install exploration-mode-skill
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name and description ('exploration mode' for autonomous research, maintenance, security review, etc.) are self-consistent with an instruction-only skill that triggers idle-time tasks. However the claimed capabilities (system cleanup, security review, system optimization) imply access to system resources beyond a simple read-only research scope; the skill does not explain what access it needs or why.
!
Instruction Scope
SKILL.md is high-level and vague. It instructs the agent to 'autonomously perform tasks during idle time' including system cleanup and security review but provides no concrete boundaries, allowed commands, file paths, or external endpoints. That open-ended autonomy could lead to reading or modifying local files, running commands, or contacting external services — none of which are constrained or justified by the document.
Install Mechanism
Instruction-only skill with no install spec and no code files => low install risk. Nothing is written to disk by an installer and there are no external download URLs to evaluate.
Credentials
The skill requests no environment variables, credentials, or config paths, which is proportionate on paper. However, because instructions are ambiguous about what the agent may access, the absence of declared required secrets does not guarantee the agent won't attempt to read sensitive data at runtime.
Persistence & Privilege
always is false (good). The skill relies on the platform's normal autonomous invocation capability (disable-model-invocation is false), which means the agent can run it during idle time. Autonomous invocation by itself is not flagged, but combined with the skill's vague scope and potentially sensitive task categories (system cleanup/security review), it raises concern about unsupervised activity.
What to consider before installing
This skill is vague about what 'exploration' entails and gives the agent broad, unspecific permission to do system cleanup, security review, and optimizations during idle time. Before installing: 1) Demand a precise, written policy of allowed actions (which directories are in-scope/out-of-scope, whether it may run shell commands, whether it may modify or delete files). 2) Require explicit user confirmation for any destructive or network-capable actions. 3) Prefer a version that limits operations to read-only analysis unless the user opts in to write/delete operations. 4) Ask for logging/audit hooks and a way to revoke or pause the skill. 5) If you cannot get specifics, avoid enabling autonomous invocation or do not install the skill — leave it as user-invoked only and test in a sandbox. Additional information that would raise confidence to 'benign': a detailed SKILL.md enumerating permitted commands, file path restrictions, network endpoints (if any), and explicit safeguards (confirmation prompts, dry-run modes, and logging).

Like a lobster shell, security has layers — review code before you run it.

latestvk976et5b2aqd4rnevz3e35yg6d8359hm
184downloads
0stars
1versions
Updated 21h ago
v1.0.0
MIT-0

exploration-mode-skill

AI self-exploration and autonomous task execution.

Description

In exploration mode, the AI autonomously performs tasks during idle time, including research, system maintenance, and self-improvement.

Modes

Collaboration Mode (协作模式)

  • High-frequency dialogue with user
  • Focus on specific tasks
  • Real-time response

Exploration Mode (探索模式)

  • Autonomous task execution during idle
  • Task categories:
    • Project research (项目调研)
    • System cleanup (系统清理)
    • Security review (安全审查)
    • Self-reflection (自我反省)
    • Knowledge accumulation (知识沉淀)
    • System optimization (系统优化)

Usage

进入探索模式
切换到协作模式
查看当前模式
探索模式状态

Requirements

  • OpenClaw with multi-agent system

Author

小贾

Version

1.0.0

Comments

Loading comments...