Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

openclaw workspace backup

v0.1.5

将工作空间 git 仓库备份到 GitHub 各分支。通过 .env 配置目录列表,每天 03:00 自动执行。当用户说"workspace-backup"、"备份工作空间"、"工作空间备份"时触发。

0· 161·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for zhangpengle/openclaw-workspace-backup.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "openclaw workspace backup" (zhangpengle/openclaw-workspace-backup) from ClawHub.
Skill page: https://clawhub.ai/zhangpengle/openclaw-workspace-backup
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required binaries: git
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install openclaw-workspace-backup

ClawHub CLI

Package manager switcher

npx clawhub@latest install openclaw-workspace-backup
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Name/description claim: back up workspaces to GitHub branches. Code requires only git and reads WORKSPACE_<id>=<path> entries from package/user .env files — this is consistent. Minor mismatch: code pushes to remote named 'origin' (generic) and does not verify the remote is GitHub; the description suggests GitHub specifically.
!
Instruction Scope
Runtime behavior (workspace_backup/cli.py) will: read package and user .env files, iterate arbitrary directories specified there, run git add -A, commit, and push for each path, and write logs to ~/.openclaw/logs/backup.log. This is within backup purpose, but the agent will automatically add/commit/push whatever files are in the configured directories (including secrets like keys, config files, or other sensitive data) without any review or filtering. The code also does not switch or create branches before pushing and may fail or push unexpected refs. Daily automated execution increases the risk of unintended data exposure.
Install Mechanism
No install spec in registry; SKILL.md metadata suggests 'pip install -e {baseDir}' which is a reasonable install path for a Python CLI. No remote downloads or extract steps. Because code files are included, installing the package would place code on disk — expected for this type of utility.
Credentials
The skill does not request credentials or sensitive environment variables. It reads only package-level and user-level .env files for WORKSPACE_<id> entries (paths supplied by the user). No extra API keys or unrelated credentials are required.
Persistence & Privilege
always:false (not force-included). The SKILL.md says OpenClaw cron will run it daily at 03:00 — autonomous invocation combined with scheduled runs means the skill will act without interactive approval on each run. Autonomous invocation itself is normal, but combined with automatic commits/pushes this raises the operational risk if misconfigured.
What to consider before installing
Before installing or enabling this skill: (1) Inspect and control the .env files it will read (package .env and ~/.config/workspace/.env). Only list directories you intentionally want backed up; do not include home-level or system-level paths that may contain secrets. (2) Test on a non-sensitive directory first to confirm push behavior (branch naming, push errors). The tool commits with git add -A and push --force optionally — be sure you understand the consequence. (3) Confirm the 'origin' remote for each repo points to the intended GitHub repository (the code does not verify the host). (4) Consider modifying the script or adding a dry-run/approval step to avoid accidental commits of credentials or private files. (5) If you need stricter guarantees, run this locally under your control or add repository-level protections (or a dedicated remote) to prevent accidental exfiltration. Install only if you accept the risk of unattended commits/pushes from the configured directories.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

💾 Clawdis
Binsgit
latestvk970k12twbqzrt97wyda4k0dxd83r7xw
161downloads
0stars
4versions
Updated 1mo ago
v0.1.5
MIT-0

Workspace Backup

将多个本地 git 工作空间自动备份到 GitHub,每个目录对应一个同名远程分支。

使用

workspace                    # 备份所有工作空间
workspace --backup --force   # 强制推送(解决 non-fast-forward 错误)
workspace --status           # 查看各工作空间状态及最近备份日志

每天 03:00 由 OpenClaw cron 自动执行。

配置

workspace_backup/.env(或 ~/.config/workspace/.env)中配置备份目录:

WORKSPACE_main=/home/ubuntu/.openclaw/workspace
WORKSPACE_formulas=/home/ubuntu/.openclaw/workspace-formulas

WORKSPACE_<id><id> 即为目标 GitHub 分支名。用户级 .env 优先于包级 .env。 复制 workspace_backup/.env.example.env 后修改路径即可。

前提条件

  • SSH Key 已配置,可免密 git push
  • 各工作空间目录已初始化为 git 仓库并设置远程

Comments

Loading comments...