Pr Ship

v1.0.13

Pre-ship risk report for OpenClaw PRs. Dynamically explores the codebase to assess module risk, blast radius, and version-specific gotchas. Scores each findi...

0· 809·2 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name, README and SKILL.md describe exactly the claimed capability (diff current branch vs main, run grep/find/git-based investigations, produce a risk report) and the included reference docs support that. However, package metadata and the provided test/update script expect additional host tooling (node, jq, python3, git) and specific local paths (/home/dev/.openclaw/..., $HOME/.openclaw/cron/jobs.json). Those tool/path assumptions are not declared in the skill's requirements, which is an incoherence to be aware of.
Instruction Scope
Most runtime instructions stay inside the OpenClaw repository (git diff, grep, find, reading references/). That matches the stated constraint 'for the OpenClaw repository only'. But the included scripts (scripts/test-update-pipeline.sh) also read and validate files outside the repo (cron jobs JSON in $HOME, /home/dev openclaw paths), check git remote URLs and fetch upstream — which extends scope beyond the repo and may perform network operations. The SKILL.md itself doesn't clearly warn that auxiliary scripts touch system configuration and expect cron update behavior.
Install Mechanism
No install specification (instruction-only) — lowest install risk. The only shipped executable artifact is a bash script intended for the update/validation pipeline; nothing is downloaded or extracted at install time. Still, that script is designed to be run by a host environment (cron) and performs read/write checks on host paths.
Credentials
The skill declares no required env vars or primary credentials, which fits a repo-local reviewer tool. In practice it implicitly requires several host tools (git, grep/sed, node, jq, python3, pnpm, clawhub) and may attempt network git operations (git fetch upstream). If the user's OpenClaw checkout or upstream remotes are private, git network actions could require credentials. The skill does not declare these binary/credential expectations.
!
Persistence & Privilege
always:false (good). However, the repo includes a script and textual guidance for a cron/update pipeline that modifies references/CURRENT-CONTEXT.md and expects periodic 'clawhub update' and local cron job orchestration. That design implies an intended persistent update mechanism (daily metadata refresh) which will write files on disk and run git operations — a non-trivial system interaction beyond one-off repo analysis. The skill itself does not require always:true, but the presence of scripts that assume cron/updater privileges elevates the surface to review carefully before enabling automated runs.
What to consider before installing
What to check before installing or running this skill: - Review scripts/test-update-pipeline.sh line-by-line. It contains hardcoded paths (/home/dev/.openclaw/skills/pr-ship, $HOME/.openclaw/cron/jobs.json) and will read local cron config and git metadata — ensure those checks are acceptable for your environment. - The SKILL.md and playbook assume many command-line tools (git, grep, sed, node, jq, python3, pnpm, clawhub). The skill does not declare these; make sure your environment provides them and consider running in a sandbox or a dedicated dev container. - The skill's update flow (clawhub update, cron-driven CURRENT-CONTEXT.md refresh) will perform network git operations (git fetch upstream). Confirm the remote origins are trustworthy and that no credentials will be accidentally exposed or used for unintended pushes. - If you plan to enable automated updates (cron/clawhub), run the update script manually first in a safe environment and verify it does not perform unexpected writes or network pushes (the test script explicitly warns cron should not run git push or clawhub publish automatically). - The skill is coherent with its stated purpose, but because it touches system files and assumes an update pipeline, treat it as potentially impactful: run reviews locally, verify remote provenance (the package.json points to a GitHub repo), and avoid enabling automatic cron updates until you confirm the workflow and remotes. If you want, I can extract the specific lines from the script that read host paths and network operations, or produce a short checklist of commands to run locally to validate behavior safely.

Like a lobster shell, security has layers — review code before you run it.

latestvk970f15jvxs09swab0p94n4tdd827k8h

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments