Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
openclaw-backup-guide
v1.0.0Automates hourly OpenClaw workspace backups with SQLite database export, optional NAS sync via rsync, and GitHub version control commits and pushes.
⭐ 0· 437·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The description promises a general-purpose backup helper (SQLite export, optional NAS sync, GitHub commits). The included scripts, however, are tied to a specific project and environment: backup-db.js points at a hard-coded projectDir ('projects/the-orbital') and requires better-sqlite3 from that project's node_modules; backup-nas.sh hard-codes SRC as /home/killingtime/hub-local and a NAS host user@192.168.4.95. The README/SKILL.md say 'rsync' for NAS sync, but the script uses tar+scp. These hard-coded targets and mismatches are not proportional to a reusable backup skill and suggest the package is a personal snapshot rather than a generic tool.
Instruction Scope
The SKILL.md instructs running the supplied scripts on an hourly cron and to commit and push the workspace (including database backups) to GitHub. The actual backup-nas.sh will create a tarball of the entire workspace and scp it to a remote host (hard-coded), and suppresses stderr (2>/dev/null) so failures/errors are hidden. backup-db.js directly accesses a specific project's DB path and loads a module from that project's node_modules. The scripts read and transmit whole workspace content and a DB file — operations that go beyond a minimal, clearly parameterized backup guide and could lead to unintended data exposure if the remote target is not controlled by the user.
Install Mechanism
There is no automated install/download mechanism; this is an instruction + script bundle. No external URLs or archive extraction are performed by the skill itself, which reduces supply-chain risk. However, the included scripts will execute local filesystem and network operations when run.
Credentials
The skill declares no required environment variables or credentials (which is appropriate), but the scripts embed environment-specific values (home path, project path, NAS username and IP) in plain text. SKILL.md suggests using GitHub SSH keys or tokens but does not request them programmatically — nonetheless the practice of committing DB backups to a repo and scp-ing to a hard-coded host is disproportionate without clear justification or parameterization. Also, error suppression in the scripts can hide failed authentication or transfer activity.
Persistence & Privilege
The skill does not request permanent/always-on inclusion and does not modify other skills or system-wide agent settings. It relies on the user to schedule cron jobs; autonomy flags are default and not elevated here.
What to consider before installing
This bundle looks like a personal backup snapshot repackaged as a skill. Before installing or running anything:
- Inspect and edit both scripts. Replace hard-coded paths (projectDir, SRC) and the hard-coded NAS host/user with variables you control. Do not run the scripts until those are set to your intended locations/hosts.
- Note the documentation mismatch: SKILL.md/README mention rsync, but backup-nas.sh uses tar+scp. Decide which method you actually want (rsync generally preserves deltas and is safer for large repos).
- Remove or avoid scp to unknown hosts. The script will send a full workspace tarball and a DB file to 192.168.4.95:lstone by default — that could exfiltrate sensitive data if left unchanged. If you do need remote backups, point to your own trusted target or use encrypted transfer/at-rest encryption.
- The scripts suppress stderr (2>/dev/null), which hides failures and could mask problems or abuse; remove that redirection while testing so you can see errors.
- Avoid committing sensitive databases to a Git repo unless the repo is private and you have encryption or other access controls. Prefer storing backups outside VCS or encrypting the backup artifacts before committing.
- backup-db.js expects better-sqlite3 in the target project's node_modules and a very specific folder layout; adjust the script to take configurable paths or to use a bundled dependency to be more robust.
- Run the scripts in a safe test environment first (not on your production workspace). Consider doing a dry-run (no scp/git push) to validate behavior.
Given the hard-coded personal values and doc/code mismatches, treat this as a potentially sloppy or repurposed personal utility rather than a vetted, generic backup skill. If you want to use it, sanitize and parameterize the scripts and verify endpoints/permissions first.Like a lobster shell, security has layers — review code before you run it.
latestvk978bb0hbj9t37t3r7q7qrb75181q880
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
