Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

OpenClaw备份回滚系统

v1.1.0

自动备份和回滚OpenClaw配置,每15分钟备份一次,支持手动备份、版本选择恢复,保留最近96个备份。

0· 95·0 current·0 all-time
byacrdik@wuyuyang2

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for wuyuyang2/openclaw-backup-rollback.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "OpenClaw备份回滚系统" (wuyuyang2/openclaw-backup-rollback) from ClawHub.
Skill page: https://clawhub.ai/wuyuyang2/openclaw-backup-rollback
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-backup-rollback

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-backup-rollback
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The stated purpose (automatic backups every 15 minutes, manual backup/restore) aligns with the included scripts: they tar.gz ~/.openclaw, keep recent backups, and stop/start services for restore. However, backup_openclaw.sh hardcodes /home/acrdik rather than using ~ or Path.home(), which makes the script user-specific and inconsistent with the SKILL.md and other Python scripts. The plugin metadata (openclaw.plugin.json) also references a cron script (scripts/backup_cron.py) that is not present.
!
Instruction Scope
Runtime instructions and scripts perform expected actions (tar, exclude patterns, create pre-rollback backup, stop/start services). Concerns: (1) rollback.py's diff function checks a specific filename 'memory/2026-04-03.md' — a hard-coded date/file that is likely incorrect or leftover, (2) plugin.json declares a cron hook file that doesn't exist, (3) backup_openclaw.sh uses absolute /home/acrdik paths which may write or fail on other systems, (4) scripts will archive user files under ~/.openclaw (which could contain secrets or tokens) and will overwrite files on restore — this is expected for a restore tool but warrants caution and testing. There are no network endpoints or credential exfiltration in the code.
Install Mechanism
No install spec — instruction-only plus shipped scripts. That lowers install-time risk (nothing downloaded from third-party URLs). The code will be written to disk when the user installs the skill (normal for packaged skills).
Credentials
The skill declares no required environment variables or credentials, and the scripts do not perform network calls or ask for secrets. This is proportionate. However, the hard-coded absolute path (/home/acrdik) is user-specific and may cause the script to operate on the wrong account or fail; review and replace with a portable HOME-based path before use.
Persistence & Privilege
always is false (good). The scripts stop/start user services via 'systemctl --user' which requires the user to have those systemd user services — stopping services is expected for a restore but is a privileged operation relative to service availability. Autonomous invocation (disable-model-invocation: false) is allowed by default; combined with the other inconsistencies this increases the need to review and test the skill before granting it runtime autonomy.
What to consider before installing
Before installing, check the following: 1) The plugin metadata references scripts/backup_cron.py but that file is missing — ask the author or fix the hook to point to an existing script. 2) Replace the hard-coded path (/home/acrdik) in scripts/backup_openclaw.sh with a portable HOME/Path.home() usage so backups go to the correct user's ~/.openclaw. 3) Investigate the hard-coded config name 'memory/2026-04-03.md' in rollback.py (likely leftover) and adjust the diff list to the files you actually care about. 4) Test the backup and restore process on a non-production instance to confirm exclusions, retention (96 backups), and that restores do what you expect. 5) Verify the set of systemd user services stopped/started by the scripts exist on your system and that you are comfortable granting the skill the ability to stop/start them. 6) Inspect backup contents to ensure no sensitive secrets are being archived unintentionally. 7) Because the source/homepage is unknown, prefer to only install after the above fixes or obtain a vetted copy from a trusted source. If you cannot validate or fix these issues, do not enable autonomous invocation in a production agent.

Like a lobster shell, security has layers — review code before you run it.

backupvk97b01z3srnxj7mvf54x5j7ppn8459nnlatestvk97b01z3srnxj7mvf54x5j7ppn8459nnrecoveryvk97b01z3srnxj7mvf54x5j7ppn8459nnrollbackvk97b01z3srnxj7mvf54x5j7ppn8459nn
95downloads
0stars
2versions
Updated 3w ago
v1.1.0
MIT-0

OpenClaw 备份回滚系统

自动备份 + 回滚系统,保护OpenClaw配置安全。

功能

  • 自动备份:每15分钟自动备份整个 .openclaw 目录
  • 手动备份:执行 /backup 立即备份
  • 版本回滚:执行 /rollback 查看所有版本并选择还原
  • 预览差异:还原前可查看备份与当前配置的差异
  • 暂不还原:可取消操作
  • 压缩存储:仅11MB/个,保留最近96个(约24小时)

使用方式

命令说明
/backup立即执行一次备份
/backup list列出所有可用备份
/rollback弹出版本选择卡片
/backup restore <timestamp>还原指定版本

工作原理

  1. 备份:tar + gzip 压缩整个 openclaw 目录
  2. 排除:node_modules / .cache / backups / logs / media
  3. 还原前:自动备份当前状态到 pre_rollback_<timestamp>.tar.gz
  4. 还原:tar -xzf 解压覆盖 → 重启Gateway

文件结构

openclaw-backup-rollback/
├── openclaw.plugin.json     # 插件元数据
├── SKILL.md                 # 本文档
└── scripts/
    ├── backup_openclaw.sh   # 备份脚本
    ├── rollback.py          # 回滚脚本
    └── backup_rollb_plugin.py  # 插件主入口

安装

clawhub install openclaw-backup-rollback

配置

无需配置,安装后自动生效。备份保存到 ~/.openclaw/backups/

依赖

  • tar, gzip (系统自带)
  • systemctl (systemd)
  • Python 3 (用于回滚脚本)

Comments

Loading comments...