Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Persistent Code Terminal

v1.2.0

Persistent per-project coding terminal (tmux). Run Codex CLI (codex exec) inside a stable session; mobile/SSH friendly.

1· 1.7k·26 current·26 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (persistent tmux terminal for Codex-driven workflows) align with required binaries (tmux) and the included scripts (start/send/read/summary/auto/route/codex-exec). The ability to run 'codex exec' (if installed) is expected for this skill's purpose.
Instruction Scope
Runtime instructions and scripts operate on the local filesystem, tmux sessions, and git repos in the current working directory (creating .pct-state.json and .pct-routing.log). They can run arbitrary shell commands via tmux and (if present) invoke the Codex CLI which may make code changes and network operations (e.g., git push). This is consistent with the purpose but is the primary risk surface (automated changes/pushes).
Install Mechanism
Install spec is limited to installing tmux (brew formula; SKILL.md also documents apt). No downloads from arbitrary URLs or extract steps. Minor metadata inconsistency: registry install list shows brew only while SKILL.md metadata also references an apt entry — both are reasonable package sources for tmux.
Credentials
The skill declares no required environment variables or credentials (correct for a local tooling skill). Scripts do optionally read/ honor an environment override OPENCLAW_CONFIG_DEV_AUTO_CODE_ROUTING (not declared in the registry metadata) and standard vars like HOME — this is reasonable but worth noting. The Codex CLI (if present) is an external dependency that may require network access/credentials outside this skill (not requested by the skill itself).
Persistence & Privilege
always:false (no forced inclusion). The skill writes local state files (.pct-state.json, .pct-routing.log) in the project, creates tmux sessions, and can be invoked autonomously by the agent (disable-model-invocation:false) which is platform-default. Enabling auto-routing or invoking codex exec gives the agent the ability to run commands that may change and push code — this is expected functionality, not an unexplained privilege escalation.
Assessment
This skill appears to be what it claims: a set of shell scripts that create per-project tmux sessions and optionally run the Codex CLI inside them. Before installing, consider the following: - Autonomy risk: if you enable OpenClaw auto-routing (openclaw.config.dev.autoCodeRouting = true) or allow the agent to invoke skills autonomously, the agent may run the Codex CLI which can perform edits, run builds/tests, and push to remotes. Auto-routing is disabled by default, but enable it only if you trust the agent and the Codex CLI behavior. - Review the scripts: they write .pct-state.json and .pct-routing.log into your repo and use tmux capture/ send-keys to run arbitrary shell commands — inspect the code if you have sensitive data in the repo or require stricter audit controls. - Codex CLI network access: the skill does not request credentials, but the Codex CLI (external tool) may perform network calls. Make sure you understand your Codex CLI's sandbox/permission model and what remote auth (SSH keys, Git credentials) it can use. - Scope of install: install the skill at project scope (repo/skills/...) rather than globally, unless you want it available everywhere. That reduces accidental cross-repo execution. - Small metadata notes: SKILL.md reads OPENCLAW_CONFIG_DEV_AUTO_CODE_ROUTING as an env override (not declared in registry metadata) and lists apt in metadata while the registry install spec lists brew — this is minor but worth being aware of. If you plan to use automated/Codex-driven pushes, test in a safe repository first, run the included doctor script, and consider setting PCT_CODEX_NO_DEFAULT_FLAGS=1 or keeping autoCodeRouting disabled until you are confident in the workflow.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cztpj1gg4hkn18fzszbyt4d81ympk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

💻 Clawdis
OSmacOS · Linux
Binstmux

Install

Install tmux (brew)
Bins: tmux
brew install tmux

Comments