Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Hostcheck

v1.0.0

Free host health check for OpenClaw deployments. Check system status, updates, security settings, and provide recommendations. No paid tools required.

0· 122·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for bwtomekk-bit/hostcheck.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Hostcheck" (bwtomekk-bit/hostcheck) from ClawHub.
Skill page: https://clawhub.ai/bwtomekk-bit/hostcheck
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install hostcheck

ClawHub CLI

Package manager switcher

npx clawhub@latest install hostcheck
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description match the checks listed (uptime, updates, SSH, UFW, backups, OpenClaw status). Requesting no credentials and having no install spec is reasonable for a read-only host check. However, a host health check will necessarily need local command access (apt, journalctl, ufw, rsync, etc.), which the SKILL.md does not explicitly declare as required binaries or required privilege levels.
!
Instruction Scope
The SKILL.md describes checks and example commands but is vague about which exact commands the agent will run and which files/paths it will read. It references 'journalctl --user -u trading-*', a service name unrelated to the generic host-check purpose (appears to be a leftover or template artifact). That vagueness grants the agent broad discretion to read logs and run privileged commands unless constrained at runtime.
Install Mechanism
There is no install spec and no code files; this lowers risk because nothing is written to disk by the skill itself.
Credentials
No environment variables or credentials are requested, which is proportionate. However, the skill implies the use of sudo and access to system logs/configs; the skill does not state this explicitly or recommend minimum privilege levels, so it may silently require elevated access when actually run.
Persistence & Privilege
always:false and no persistence or config writes are requested. The skill does not request permanent host presence or modify other skills.
What to consider before installing
This skill broadly matches a host-health purpose but is vague about what it will actually run on your system and where it came from. Before installing or invoking it: 1) Ask the publisher/source and prefer skills with a homepage or repo you can inspect. 2) Request a concrete list of commands and file paths the skill will read (e.g., /etc/ssh/sshd_config, ufw status, apt list --upgradable). 3) Verify whether it needs sudo; avoid granting persistent sudo. 4) Ask why it references 'journalctl --user -u trading-*' and remove or replace unrelated service names. 5) Test on a non-production host first. If you cannot get a clear command list and source, treat the skill cautiously and do not give it elevated privileges or full autonomous execution rights.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🖥️ Clawdis
latestvk978hmk6yszy4amarwrq02s8qd83b3gp
122downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

Host Health Check - Free Edition

A free skill that checks your OpenClaw host for basic health, security posture, and maintenance status. Provides recommendations without requiring paid antivirus software.

What It Checks

1. System Status

  • Uptime
  • Memory usage
  • Disk space
  • CPU load

2. Update Status (apt)

  • Pending security updates
  • Outdated packages
  • Last update check

3. Security Posture

  • SSH configuration (password auth, root login)
  • Firewall status (ufw)
  • Open ports
  • Failed login attempts

4. Backup Status

  • Backup cron jobs
  • Recent backup files
  • Disk space for backups

5. OpenClaw Status

  • Gateway running
  • Services status
  • Recent errors

Usage

When user asks for system health, security check, or similar:

/hostcheck

Or just describe what you want:

  • "Check my system"
  • "Is everything up to date?"
  • "Security status"

Output Format

Provide a clear status report:

## 🖥️ System Health Report

### ✅ System Status
- Uptime: 5 days
- Memory: 45% used
- Disk: 62% used

### ⚠️ Updates Available
- 3 security updates (run: sudo apt upgrade)
- Last check: 3 days ago

### 🔒 Security
- SSH: Password auth disabled ✓
- Firewall: Active ✓
- Failed logins: 0 (last 24h)

### 💾 Backups
- Last backup: Yesterday
- Next backup: Tomorrow 02:00

### 🔧 OpenClaw
- Gateway: Running ✓
- Services: All active ✓

Recommendations

If issues found, provide actionable advice:

  • Run sudo apt update && sudo apt upgrade
  • Check firewall with sudo ufw status
  • Review logs with journalctl --user -u trading-*
  • Set up backups with rsync or Borg

Notes

  • This is READ-ONLY by default
  • Ask before making any changes
  • Does NOT include virus scanning (requires ClamAV)
  • Does NOT include real-time protection
  • UFW requires manual installation (sudo apt install ufw)

Current Host Status (Example)

CheckStatusNote
SSH✅ SecureKeys only, no password auth
UFW⚠️ Not installedTailscale provides network-level security
Updates✅ CurrentUbuntu 25.10, 4 phased updates

Comments

Loading comments...