Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Nm Leyline Service Registry

v1.0.0

Service registry patterns for managing external services, health checks, centralized configuration, and unified execution

0· 44·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
Requires OAuth token
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The declared purpose (service registry, health checks, quota/usage logging) aligns with the declared required config paths (night-market.quota-management, night-market.usage-logging). However, the SKILL.md also expects per-service API key environment variables (e.g., GEMINI_API_KEY) and a local config file (~/.claude/leyline/services.yaml) but the metadata does not declare these env vars or that config path — a mismatch between claimed requirements and what the instructions actually use.
!
Instruction Scope
The instructions direct the agent to build and run external commands (e.g., gemini, qwen) and to read environment variables and YAML config. Building commands via templates and formatting prompts/files into them gives broad discretion to execute arbitrary CLI commands; while this is expected for a registry, the skill does not constrain or explicitly declare which env vars or config files it will access. The instructions also include examples of health_check_cmd and auth_check_cmd which may run arbitrary commands defined in configuration.
Install Mechanism
This is an instruction-only skill with no install spec and no code files to write to disk, which is the lowest install risk.
!
Credentials
Although the skill lists no required env vars in its metadata, the docs and examples rely on auth_env_var values (e.g., GEMINI_API_KEY, QWEN_API_KEY) and show loading from environment. The skill therefore implicitly expects credential-bearing environment variables without declaring them. That mismatch reduces transparency and could lead to accidental exposure of credentials.
Persistence & Privilege
The skill is not marked always:true and does not request to modify other skills or system-wide settings. Autonomous invocation is allowed (platform default) but not combined with other high-privilege flags.
What to consider before installing
This skill is an instruction-only pattern for managing and executing external service CLIs. Before installing: (1) understand that at runtime the agent will build and run arbitrary commands (e.g., gemini, qwen) and may read environment variables and local config files — review any service configs you add to avoid exposing secrets; (2) note the skill does not declare the API key env vars it expects (e.g., GEMINI_API_KEY), so double-check what environment variables will be accessed and avoid placing high-value credentials in plain env if you don't trust the skill; (3) inspect or restrict the ~/.claude/leyline/services.yaml and any health_check_cmd/auth_check_cmd values to ensure they do not execute unsafe commands; (4) run the skill with least privilege (not as root) and limit which services/config entries are registered; (5) if you need higher assurance, request the author to declare required env vars and explicit config paths in metadata or provide a trimmed/sandboxed implementation.

Like a lobster shell, security has layers — review code before you run it.

latestvk97egh9vz35m8y8m2mprtzyjpn84rn9w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🦞 Clawdis
Confignight-market.quota-management, night-market.usage-logging

Comments