Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Pc Assistant Fixed

v1.0.0

PC healthcheck and diagnostics with detailed system information and actionable recommendations. Works on Windows, macOS, and Linux. Read-only system diagnost...

0· 226·0 current·0 all-time
byNing@ningtoba·duplicate of @ningtoba/pc-assistant

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for ningtoba/pc-assistant-fixed.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Pc Assistant Fixed" (ningtoba/pc-assistant-fixed) from ClawHub.
Skill page: https://clawhub.ai/ningtoba/pc-assistant-fixed
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install pc-assistant-fixed

ClawHub CLI

Package manager switcher

npx clawhub@latest install pc-assistant-fixed
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The name/description promise cross-platform (Windows, macOS, Linux) diagnostics, but the provided repository only contains a Linux Bash healthcheck plus wrapper/scheduler. install.yaml and SKILL.md reference healthcheck.command (macOS) and healthcheck.ps1 (Windows) but those files are not present in the manifest — that is an inconsistency in claimed capability vs. delivered files.
Instruction Scope
The runtime instructions and scripts perform broad read-only system collection (hostname, /proc, lsblk, ip/ss, package lists, Docker, GPU, SMART, /var/log/auth.log, and snippets of ~/.ssh/authorized_keys and known_hosts). These actions are consistent with a diagnostics tool but will capture sensitive information (SSH key contents, failed-login lines, installed packages and user lists). The instructions do not attempt network exfiltration, but they do instruct writing timestamped reports to disk which could leak data if stored in world-readable locations.
Install Mechanism
There is no download-from-URL or binary installer; the skill is instruction/script-based and includes an install.yaml describing intended install paths. No remote fetches or archive extracts are present in the provided files — low install risk. Note: the manifest suggests files will be installed under an npm-global path, but no automated installer is included.
Credentials
The skill requests no credentials or special environment variables by default. It does use/mention configurable env vars (PC_ASSISTANT_OUTPUT_DIR, PC_ASSISTANT_CLEANUP, etc.) which are proportionate. However, the script reads sensitive files (SSH authorized_keys, known_hosts, /var/log/auth.log, user directories and program files under WSL) — this access is explainable for a healthcheck but is sensitive and should be explicitly accepted by the user before running or scheduling.
Persistence & Privilege
always is false and the skill does not request privileged permanent presence. The scheduler will create and optionally delete files in the configured output directory; cleanup is opt-in (PC_ASSISTANT_CLEANUP). The skill does not modify other skills or system-wide agent configuration.
What to consider before installing
This skill appears to be a legitimate Linux system healthcheck script, but before installing or scheduling it you should: (1) note the manifest and docs claim macOS/Windows support even though those platform scripts are not included — ask the author for the missing files or treat it as Linux-only; (2) review the healthcheck.sh yourself (it is included) and confirm you're comfortable with it reading files such as ~/.ssh/authorized_keys, ~/.ssh/known_hosts, /var/log/auth.log, and installed-package lists — these will appear in the generated reports; (3) run it as your regular (non-root) user and in a safe environment first (or inside a VM/container) to inspect outputs; (4) set PC_ASSISTANT_OUTPUT_DIR to a private directory with appropriate permissions and do not store reports in world-readable locations; (5) avoid scheduling until you confirm the script's behavior and the location/rotation/cleanup policy; and (6) if you expect true cross-platform support, request the missing macOS/Windows scripts or choose a different skill packaged for those OSes.

Like a lobster shell, security has layers — review code before you run it.

latestvk972ha8nh00zc99ca07kzxewrn834n6g
226downloads
0stars
1versions
Updated 6h ago
v1.0.0
MIT-0

PC Assistant - Healthcheck Skill

Overview

This skill runs a comprehensive PC healthcheck that provides detailed system information along with actionable recommendations to fix any issues found. Supports Windows, macOS, and Linux.

When to Use

  • User asks for a "PC healthcheck", "system check", or "diagnostics"
  • User wants to check storage, CPU, memory, GPU, or network
  • User asks "how is my PC doing?" or "is everything ok?"
  • User needs specific recommendations to fix issues (like low disk space)

Requirements

  • Platform: Windows, macOS, or Linux (including WSL)
  • Permissions: Read-only for most checks
  • Tools used: Platform-specific system utilities

Execute Healthcheck

The skill automatically detects your OS and runs the appropriate script:

~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/healthcheck.sh    # Linux/WSL
~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/healthcheck.ps1   # Windows
~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/healthcheck.command  # macOS

Or use the convenience wrapper (auto-detects OS):

~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/run.sh

The script outputs:

  • healthcheck_YYYYMMDD_HHMMSS.txt - Full human-readable report with recommendations
  • healthcheck_YYYYMMDD_HHMMSS.json - JSON summary

Platform-Specific Features

Linux/WSL

  • System overview (OS, kernel, uptime)
  • Storage & disk (df, partitions, SMART)
  • Network (interfaces, routes, DNS, ports)
  • Processes & services (systemctl)
  • Users & security (SSH keys, failed logins)
  • Package management (apt, npm, pip)
  • Containers (Docker, Podman)
  • GPU info (nvidia-smi)
  • Hardware (USB, PCI, temperature)

Windows (PowerShell)

  • System overview (Win32_OperatingSystem)
  • CPU & memory (Win32_Processor, Win32_OperatingSystem)
  • Storage (Win32_LogicalDisk)
  • Network adapters
  • Processes (Get-Process)
  • Services (Get-Service)
  • Installed software (registry)
  • Security (Firewall, Windows Defender)
  • Event logs

macOS

  • System overview (sw_vers, system_profiler)
  • CPU & memory (vm_stat, sysctl)
  • Storage (diskutil)
  • Network (ifconfig, airport)
  • Processes (ps)
  • Launch agents & daemons
  • Security (Firewall, Gatekeeper, FileVault)
  • Homebrew packages
  • Battery status

What the Healthcheck Captures

SectionInformation
System OverviewOS, kernel, uptime, user, shell
CPUModel, cores, speed, usage
MemoryTotal, free, used, percentage
StorageDisk usage, partitions, SMART status
NetworkInterfaces, IP addresses, DNS
ProcessesTop CPU/memory consumers
ServicesRunning/stopped services
SecurityFirewall, antivirus status
SoftwareInstalled packages & apps
HardwareGPU, USB, temperature
SummaryHealth score + recommendations

Recommendations Included

The report automatically includes specific recommendations when issues are detected:

Storage Issues (High disk usage)

  • Specific folders to check
  • Platform-specific cleanup instructions
  • Docker/container cleanup commands

Memory Issues

  • How to free up RAM
  • Which apps to close

General Maintenance

  • System update commands
  • Security best practices

Scheduling (Cron Jobs)

The skill includes a scheduler script for automated periodic healthchecks:

Quick Start

# Run with defaults (saves to /tmp/pc-healthcheck-reports)
~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/schedule.sh

# Custom output folder
PC_ASSISTANT_OUTPUT_DIR="$HOME/Downloads/pc-assistant reports" \
  ~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/schedule.sh

Configuration Options

Create a config file at ~/.config/pc-assistant.conf:

# Output directory for reports
PC_ASSISTANT_OUTPUT_DIR="$HOME/Downloads/pc-assistant reports"

# Report filename prefix
PC_ASSISTANT_REPORT_PREFIX="HealthCheck"

# Days to keep old reports (default: 30)
PC_ASSISTANT_KEEP_DAYS=30

# Enable automatic cleanup of old reports
PC_ASSISTANT_CLEANUP=true

Environment Variables

VariableDefaultDescription
PC_ASSISTANT_OUTPUT_DIR/tmp/pc-healthcheck-reportsWhere to save reports
PC_ASSISTANT_REPORT_PREFIXHealthCheckFilename prefix
PC_ASSISTANT_KEEP_DAYS30Days to keep reports
PC_ASSISTANT_CLEANUPfalseAuto-delete old reports
PC_ASSISTANT_CONFIG~/.config/pc-assistant.confConfig file path

Cron Job Example

# Add to crontab (runs daily at midnight)
0 0 * * * PC_ASSISTANT_OUTPUT_DIR="$HOME/Downloads/pc-assistant reports" \
  ~/.npm-global/lib/node_modules/openclaw/skills/pc-assistant/scripts/schedule.sh

Output

Reports are saved to:

  • Linux/WSL: /tmp/pc-healthcheck/ (or custom via config)
  • Windows: $env:TEMP\pc-healthcheck\ (usually C:\Users\...\AppData\Local\Temp\pc-healthcheck\)
  • macOS: /tmp/pc-healthcheck/

When using scheduler: HealthCheck_YYYYMMDD_HHMMSS.txt and .json

Tips

  • The script is read-only and safe to run multiple times
  • Reports are timestamped for historical tracking
  • Use JSON output for integration with monitoring
  • Set PC_ASSISTANT_CLEANUP=true to auto-remove old reports

Comments

Loading comments...