Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

openclaw-doc

v1.0.0

OpenClaw 平台完整使用指南。涵盖 Gateway 配置、频道设置(Telegram/Discord/WhatsApp/微信等)、定时任务、会话管理、安全策略、沙盒配置、模型管理、Agent 管理、设备配对、心跳机制、CLI 命令等。当需要:(1) 配置或排查 OpenClaw (2) 添加频道/定时任务/...

0· 78·0 current·0 all-time
byamazcuter(神奇可人)@amazcuter

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for amazcuter/openclaw-doc.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "openclaw-doc" (amazcuter/openclaw-doc) from ClawHub.
Skill page: https://clawhub.ai/amazcuter/openclaw-doc
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-doc

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-doc
Security Scan
Capability signals
CryptoRequires walletCan make purchasesRequires OAuth token
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill claims to be an OpenClaw usage guide and contains a large archive of Markdown docs and examples. It declares no binaries, env vars, or install steps — which is consistent for an instruction-only documentation skill.
Instruction Scope
The SKILL.md and included files are documentation and examples (CLI invocations, config snippets, local file paths). This stays within the stated purpose. However, the documentation contains example commands that reference local paths (e.g. /mnt/nas/openclaw-docs), gateway tokens, and env var names; those are examples for operators and could lead a user to run shell commands or paste secrets if followed blindly. The static scanner also flagged a 'system-prompt-override' pattern in the SKILL.md — the docs include mention of system prompts and directives in places (e.g., system prompt / tool behavior descriptions). The presence of that pattern in docs is worth caution but is not evidence the skill will perform prompt override actions itself.
Install Mechanism
No install spec, no code files to execute, and no downloads. Instruction-only skills are lowest risk for install-time code execution.
Credentials
The skill requires no environment variables or credentials. The documentation does, however, document many env var names (OPENCLAW_GATEWAY_TOKEN, OPENAI_API_KEY, ELEVENLABS_API_KEY, etc.) as examples required by the OpenClaw product; these are explanatory only and not requested by the skill itself.
Persistence & Privilege
always:false and no install/persistence. The skill is user-invocable and allows model invocation (default), which is expected for skills; that alone is not a problem here.
Scan Findings in Context
[system-prompt-override] unexpected: The regex scanner detected patterns associated with prompt-injection/system-prompt overrides inside SKILL.md. In this case the repository is documentation that discusses system prompts and model directives; the detection is a signal to review those sections carefully before allowing any automated agent to act on them. It does not by itself indicate malicious behavior given this is a docs bundle.
Assessment
This skill is a large offline copy of OpenClaw documentation and appears coherent for that purpose — it does not request secrets, install code, or require special privileges. Before installing or allowing autonomous use, review the SKILL.md and README for any examples that ask you to run shell commands or paste tokens. The scanner flagged a prompt-injection pattern: check any sections that mention 'system prompt' or model directives so you don't accidentally allow the agent to change system prompts or paste credentials. If you plan to let the agent invoke this skill autonomously, consider restricting autonomous invocation or reviewing the docs in a sandbox first, and never paste real API keys or gateway tokens into chat windows or into examples provided by the skill.
!
references/channels/googlechat.md:185
Prompt-injection style instruction pattern detected.
!
references/channels/group-messages.md:21
Prompt-injection style instruction pattern detected.
!
references/concepts/memory.md:70
Prompt-injection style instruction pattern detected.
!
references/date-time.md:63
Prompt-injection style instruction pattern detected.
!
references/gateway/configuration-reference.md:163
Prompt-injection style instruction pattern detected.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cqh9qwnkpbpbjzcrajb2btx84es0s
78downloads
0stars
1versions
Updated 2w ago
v1.0.0
MIT-0

OpenClaw 使用指南

OpenClaw 是一个开源的 AI 个人助手框架,通过 Gateway 连接多种频道(Telegram、Discord、WhatsApp、微信等),配合模型提供商(Kimi、GLM、OpenRouter 等)提供智能助手能力。

快速命令

需求命令
查看状态openclaw status
切换模型/model kimi-coding/k2p5
压缩上下文/compact
健康检查openclaw doctor
安全审计openclaw security audit [--fix]

核心架构

  • Gateway: WebSocket 服务器,管理频道/节点/会话/hooks
  • Agent Loop: 用户消息 → 模型推理 → 工具调用 → 循环直到完成
  • Context Engine: 系统提示 + 工作区文件 + 对话历史 + 心跳
  • Compaction: 上下文接近窗口限制时自动压缩

文档导航

本 Skill 包含 212 篇 OpenClaw 官方文档完整内容,按目录组织:

核心概念 - references/concepts/

架构、Agent 循环、上下文引擎、模型故障转移、会话管理、记忆系统等 26 篇

Gateway - references/gateway/

配置、认证、安全、沙盒、心跳、远程访问、Tailscale、故障排除等 33 篇

CLI 命令 - references/cli/

所有子命令:config、gateway、models、sessions、devices、nodes、cron、security 等 46 篇

频道配置 - references/channels/

Telegram、Discord、WhatsApp、Signal、Slack、微信等各平台配置 29 篇

工具 - references/tools/

exec、browser、web、PDF、skills、subagents、thinking 等 25 篇

自动化 - references/automation/

cron 定时任务、webhook、hooks、投票、认证监控 11 篇

模型提供商 - references/providers/

Anthropic、GLM、Moonshot、OpenAI、OpenRouter、Ollama、Qwen 9 篇

入门指南 - references/start/

快速开始、安装、引导 5 篇

安全 - references/security/

威胁模型 1 篇

帮助 - references/help/

FAQ、调试、环境变量 4 篇

安装 - references/install/

Docker、Node.js、更新 4 篇

Web - references/web/

Dashboard、Control UI 3 篇

参考模板 - references/reference/

AGENTS.md、SOUL.md、BOOTSTRAP.md 等工作区模板 8 篇

其他

使用建议

遇到具体问题时,直接查阅对应目录下的文档。例如:

  • 配置 Telegram → references/channels/telegram.md
  • 设置定时任务 → references/automation/cron-jobs.md + references/cli/cron.md
  • 安全审计 → references/gateway/security/index.md + references/cli/security.md
  • 模型配置 → references/concepts/models.md + references/cli/models.md

Comments

Loading comments...