Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Proxmox Full

v1.0.0

Complete Proxmox VE management - create/clone/start/stop VMs and LXC containers, manage snapshots, backups, storage, and templates. Use when user wants to manage Proxmox infrastructure, virtual machines, or containers.

7· 2.9k·4 current·4 all-time
byMortada Sarheed@msarheed
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description match the requested tools: curl, jq and a Proxmox API token (PVE_TOKEN) are reasonable for a REST-API-based Proxmox management skill. However the runtime instructions require PVE_URL as an environment variable but the registry metadata does not declare PVE_URL as a required env — a small but important inconsistency.
!
Instruction Scope
Instructions are explicit curl calls to the Proxmox REST API and reference only PVE_URL and PVE_TOKEN (no unrelated file or system access). Concerns: (1) examples use curl -k/--insecure to skip TLS verification (this weakens security and may encourage insecure deployments); (2) the setup guidance suggests creating an API token with 'uncheck Privilege Separation' which implies granting broad privileges—this encourages using overly-powerful credentials; and (3) the SKILL.md contains example plaintext passwords and token examples (expected for examples but could lead to user copy-paste of insecure defaults).
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest install risk (nothing is downloaded or written by an installer).
!
Credentials
The declared primary credential (PVE_TOKEN) is appropriate for Proxmox API access. However the instructions also require PVE_URL but that env var is not declared in the metadata. The guidance to create broad tokens (disable privilege separation) is disproportionate to principle of least privilege — the skill does not justify requiring a full-cluster token versus a more limited token for specific operations.
Persistence & Privilege
always:false and no install/persistence requested. The skill can be invoked by the agent (normal), but it does not request permanent presence or modify other skills/configs.
What to consider before installing
This skill does what it says (Proxmox REST calls) but double-check before use: (1) ensure you provide PVE_URL (the metadata omitted it) and do not rely on the example 'curl -k' — enable proper TLS or trust a valid certificate; (2) create an API token with least privilege needed rather than disabling privilege separation; (3) never paste real tokens into public chat or examples; (4) test on a non-production Proxmox instance first; and (5) if you need stronger assurance, ask the publisher for clarification (why PVE_URL wasn't declared) and for instructions that avoid insecure defaults.

Like a lobster shell, security has layers — review code before you run it.

latestvk978a84hygpw48zj73g64715yx7zt552

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🖥️ Clawdis
Binscurl, jq
EnvPVE_TOKEN
Primary envPVE_TOKEN

Comments