Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Crabwalk
v0.1.0Real-time companion monitor for OpenClaw agents
⭐ 2· 1.9k·15 current·15 all-time
byluccasveg@luccast
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The declared purpose — a real-time monitor for OpenClaw agents — aligns with the instructions (install a Crabwalk binary and connect to the local OpenClaw gateway). However the SKILL.md references reading the OpenClaw config (~/.openclaw/openclaw.json) to auto-detect a gateway token, but the registry metadata did not declare any required config paths or credentials; that mismatch should have been declared.
Instruction Scope
The runtime instructions explicitly tell the agent/user to download and extract a release tarball from GitHub, copy a binary into ~/.local/bin, append PATH changes to shell rc files, optionally install system packages using sudo, and start a server bound to 0.0.0.0. The instructions also auto-detect an auth token from ~/.openclaw/openclaw.json. These actions go beyond a purely read-only monitor (they write binaries to disk, change shell startup files, may invoke elevated package installs, and expose a service to the network). Reading the OpenClaw config is consistent with the tool's purpose but should have been declared.
Install Mechanism
Install is via a GitHub Releases tarball (well-known host) and standard extraction to ~/.crabwalk, then copying the binary to ~/.local/bin. Using GitHub releases is common/expected, but extracting and executing an archive obtained at runtime writes arbitrary code to disk — acceptable for a CLI tool but inherently higher-risk than instruction-only skills. The script also attempts to install qrencode with package managers using sudo, which may prompt for elevation.
Credentials
The skill declares no required env vars or config paths, yet the CLI/README states it will auto-detect a gateway auth token from ~/.openclaw/openclaw.json. Access to that token is proportional to the stated purpose, but the omission in metadata is an inconsistency. No unrelated third-party credentials are requested.
Persistence & Privilege
The skill does not request always:true and allows user invocation. However the installer writes files to ~/.crabwalk and ~/.local/bin and appends PATH entries to ~/.bashrc/.zshrc, giving it persistent presence in the user environment. The server binds to 0.0.0.0 by default (0.0.0.0:3000), which exposes the monitor to the local network — expected for remote human access but increases attack surface and privacy risk.
What to consider before installing
What to consider before installing:
- Metadata mismatch: The skill did not declare that it reads the OpenClaw config (~/.openclaw/openclaw.json) but the instructions say it will auto-detect the gateway token there. Confirm that reading that file is acceptable for your environment.
- Binary install from GitHub: The install downloads and extracts a release tarball and places a binary in ~/.local/bin. Although GitHub releases are common, this will execute code on your machine. Verify the project's repo (https://github.com/luccast/crabwalk), review the source or release artifacts, and confirm the release checksum/signature if available.
- Persistence and shell modification: The installer appends PATH export lines to your shell rc files. Expect files under ~/.crabwalk and an executable in ~/.local/bin; be prepared to remove them if you uninstall.
- Network exposure: Crabwalk defaults to binding 0.0.0.0:3000 and instructs sharing the network IP. That makes the monitor accessible from other machines on your network — fine if intentional, risky if running on a public or untrusted network. Consider firewall rules or binding to localhost with an SSH tunnel if you want restricted access.
- Elevated installs: The script optionally uses package managers with sudo to install qrencode. Expect sudo prompts; the rest of the install does not require root.
- Safer steps: run the tool in an isolated VM/container or on a non-sensitive host first; inspect the GitHub repository and release artifacts; prefer source builds if possible; backup relevant files and review ~/.bashrc/.zshrc changes after installation.
If the author provided explicit metadata (required config path, checksums for releases, or a signed release), my confidence that this is coherent would increase. Without those, treat the skill as plausible but with installation/runtime actions that deserve manual review.Like a lobster shell, security has layers — review code before you run it.
latestvk977rdpw3b533e4fc66g6mbp4180c03r
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
