Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

NAS Agent Sync

v1.1.0

Centralizes multi-agent file storage by routing all file operations through a designated File Master agent using SSH to a Synology NAS or any SSH-accessible...

0· 724·1 current·1 all-time
byNealbuilds@neal-collab
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The stated purpose (centralized NAS file storage via a single File Master over SSH) is coherent with the instructions (ssh, rsync, sessions_send, folder layout). However the registry metadata claims no required binaries or credentials even though the SKILL.md explicitly requires ssh, rsync, and an SSH key on the File Master — this omission is an inconsistency that should be corrected.
!
Instruction Scope
The SKILL.md instructs the File Master to run ssh/rsync commands, cat files, and send file contents back to requesting agents using sessions_send. That means agents will access local workspace paths (~/.openclaw/workspace-*/memory/) and transmit file content through agent messaging. Those actions can expose secrets or large files and should be narrowly scoped, audited, and documented; the instructions do not mandate any filtering, size limits, or content-sanitization.
Install Mechanism
This is an instruction-only skill (no install spec, no code files), which minimizes installation risk. There is no download/extract/install mechanism in the registry payload.
!
Credentials
The skill metadata lists no required environment variables or primary credential, yet the runtime workflow depends on an SSH key/account on the File Master and on the target NAS accepting key-based auth. Also it expects access to local user paths like ~/.openclaw/workspace-*/ — potentially containing sensitive data. The lack of declared credentials/tools is disproportionate to what the instructions actually require.
Persistence & Privilege
The skill does not request always:true and has no install-time persistence. However the README suggests scheduling recurring backups (cron job via OpenClaw), which would enable autonomous, scheduled file transfers and therefore increases impact if misconfigured. Autonomous invocation is allowed by default; this combination warrants caution but is not itself a disqualifying privilege.
What to consider before installing
This skill is conceptually reasonable for centralizing agent files to a Synology NAS, but the SKILL.md and the registry metadata are inconsistent and the instructions ask agents to access and transmit local workspace files via sessions_send. Before installing or using it: - Expect to manually provide an SSH key/account on the File Master; the skill should explicitly declare required binaries (ssh, rsync) and the credential handling method. - Restrict the File Master to a dedicated account on the NAS with minimal permissions (dedicated home dir, no shell access beyond scp/rsync if possible). Consider a forced-command or restricted sftp/chroot account on the NAS. - Do not place private keys or long-lived secrets in agent memory or SOUL.md; store the private key only on the File Master host, with proper filesystem permissions and rotation policy. - Test with non-sensitive files first to confirm where file contents are logged or retained by the agent messaging (sessions_send). Add explicit size limits and content filters to avoid accidental exfiltration of secrets. - If you enable scheduled backups, audit the backup payload and logs and ensure backup tasks run under a least-privilege account. - Ask the skill author to update metadata to list required binaries (ssh, rsync, cron capability) and to declare what credentials the skill expects and how they should be provisioned. If you cannot confirm these changes or control of the File Master account/NAS, treat installation as higher risk and avoid sending sensitive data through the system.

Like a lobster shell, security has layers — review code before you run it.

latestvk970ekpnxtmm2jcsn12f0k63x98140v6
724downloads
0stars
2versions
Updated 6h ago
v1.1.0
MIT-0

NAS Agent Sync — Synology File Storage for OpenClaw Agents

Centralize file storage across your multi-agent team using a Synology NAS (or any SSH-accessible storage). One agent acts as File Master — all others route file requests through it.

The Problem

Multi-agent setups generate files across multiple workspaces. Without centralized storage:

  • Files get lost between agent sessions
  • No backup strategy
  • Agents duplicate work
  • No single source of truth

The Solution

Designate one agent as File Master. All file operations go through this agent via sessions_send. The File Master manages:

  • SSH connection to NAS
  • Folder structure per agent
  • File storage and retrieval
  • Cross-agent file sharing

Architecture

┌──────────┐    sessions_send     ┌────────────┐     SSH      ┌─────────┐
│ Agent A  │ ──────────────────► │ FILE MASTER │ ──────────► │   NAS   │
│ (Finance)│ "store invoice.pdf" │ (Tech Lead) │             │         │
└──────────┘                     └────────────┘             └─────────┘
                                       │
┌──────────┐    sessions_send          │  SSH
│ Agent B  │ ──────────────────►       │
│ (Sales)  │ "get sales report"        ▼
└──────────┘                     ┌─────────────┐
                                 │ _agents/     │
                                 │ ├── agent-a/ │
                                 │ ├── agent-b/ │
                                 │ ├── agent-c/ │
                                 │ └── _shared/ │
                                 └─────────────┘

Setup

1. NAS Prerequisites

  • Synology NAS (any model) or any Linux server with SSH
  • SSH access with key-based auth
  • VPN or Tailnet (recommended) for secure remote access

2. Create Folder Structure

SSH_HOST="user@your-nas-ip"

# Create agent folders (customize agent names to match your team)
ssh $SSH_HOST "mkdir -p ~/_agents/{coordinator,techops,finance,sales,marketing}"

# Create shared folders
ssh $SSH_HOST "mkdir -p ~/_shared/{config,templates}"

# Create agent directory file
ssh $SSH_HOST 'cat > ~/_shared/config/agent-directory.json << EOF
{
  "agents": {
    "coordinator": { "role": "Coordinator", "path": "~/_agents/coordinator/" },
    "techops": { "role": "File Master", "path": "~/_agents/techops/" },
    "finance": { "role": "Finance", "path": "~/_agents/finance/" }
  },
  "shared": "~/_shared/",
  "basePath": "~/"
}
EOF'

3. Configure File Master Agent

Add to your File Master agent's AGENTS.md:

## FILE MASTER — Incoming Requests

When another agent sends a file request via sessions_send:

### Store a file:
ssh USER@NAS-IP "mkdir -p ~/_agents/[agent]/[subfolder]/"
# Copy/create file there

### Retrieve a file:
ssh USER@NAS-IP "cat ~/_agents/[agent]/[file]"
# Send content back to requesting agent

### Confirm back:
sessions_send(sessionKey="agent:[requester]:main", message="Done! File at [path]")

4. Configure Other Agents

Add to each agent's AGENTS.md:

## File Operations → File Master

I do NOT access files directly. ALL file ops go through the File Master:

sessions_send(sessionKey="agent:techops:main", message="Store: [details]")
sessions_send(sessionKey="agent:techops:main", message="Retrieve: [path]")

NAS Folder Structure (Recommended)

~/
├── _agents/
│   ├── coordinator/     # Coordinator files
│   │   ├── journal/     # Daily journals
│   │   └── tracking/    # Task tracking
│   ├── techops/         # Tech docs, scripts
│   │   ├── scripts/
│   │   └── configs/
│   ├── finance/         # Finance
│   │   ├── invoices/
│   │   ├── contracts/
│   │   └── reports/
│   ├── sales/           # Sales
│   │   ├── leads/
│   │   └── proposals/
│   └── [your-agent]/    # Per-agent storage
├── _shared/
│   ├── config/          # Shared configs
│   │   └── agent-directory.json
│   └── templates/       # Shared templates
└── _backups/
    └── memory/          # Memory file backups

SSH via VPN/Tailnet (Recommended)

# Connect via secure tunnel IP (e.g. WireGuard, ZeroTier, or similar)
SSH_HOST="user@10.x.x.x"  # Your VPN/Tailnet IP

# Test connection
ssh $SSH_HOST "echo 'NAS connected!'"

Security

  • ✅ SSH key-based auth (no passwords in configs)
  • ✅ VPN/Tailnet for encrypted tunnel (no port forwarding needed)
  • ✅ File Master pattern limits SSH access to one agent
  • ✅ Other agents never get SSH credentials
  • ❌ Never store SSH keys in agent SOUL.md or memory files

Why File Master Pattern?

  1. Security: Only one agent has NAS credentials
  2. Consistency: Single point of truth for file locations
  3. Audit trail: All file ops logged through one agent
  4. Simplicity: Other agents don't need to know SSH commands

Backup Strategy

Daily Backup Cron (via OpenClaw)

Set up a cron job that backs up agent workspaces to NAS:

// Cron job config
{
  "schedule": { "kind": "cron", "expr": "0 3 * * *", "tz": "UTC" },
  "payload": {
    "kind": "agentTurn",
    "message": "Backup all agent workspaces to NAS. For each agent: rsync workspace memory/ folder to NAS _agents/{agent}/memory-backup/. Report any failures."
  },
  "sessionTarget": "isolated"
}

Manual Backup Command

# Backup specific agent
rsync -avz ~/.openclaw/workspace-finance/memory/ user@nas-ip:~/_agents/finance/memory-backup/

# Backup all agents (customize list to your team)
for agent in coordinator techops finance sales marketing; do
  rsync -avz ~/.openclaw/workspace-$agent/memory/ user@nas-ip:~/_agents/$agent/memory-backup/
done

Troubleshooting

SSH connection refused: → Check VPN/Tailnet status — is NAS online and connected? → Verify SSH service running on NAS (Synology: DSM → Control Panel → Terminal & SNMP)

Permission denied: → SSH key not added: ssh-copy-id user@nas-ip → NAS home folder not enabled (Synology: DSM → User → Advanced → Enable home service)

Slow transfers: → Use direct VPN connection (not relayed) → Consider compression: rsync -avz --compress

Compatible NAS Models

  • ✅ Synology (any model with DSM 7+)
  • ✅ QNAP (QTS 5+)
  • ✅ TrueNAS / FreeNAS
  • ✅ Any Linux server with SSH access
  • ✅ Raspberry Pi with external storage

Changelog

v1.1.0

  • Removed all specific agent/setup references
  • Generalized folder structure and examples
  • Added backup strategy with cron

v1.0.0

  • Initial release

Comments

Loading comments...