Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

SysClaw Reporting

Report system issues and submit resource requests to SysClaw via the cross-agent communication system. Use when an agent needs to report an error, warning, o...

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 18 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill says it requires no env vars or binaries in the registry metadata, but SKILL.md and the included scripts require PostgreSQL connectivity and expect the psql client (psql is invoked). Requiring DB host/user/password is coherent with the stated purpose (writing issues/requests into a SysClaw DB), but the registry metadata is inaccurate/omits those requirements which is an important inconsistency.
!
Instruction Scope
Instructions and scripts perform direct INSERTs into system_comm.issues and system_comm.agent_requests — which matches the purpose — but the SKILL.md also instructs operators/agents to record DB host/user and connection details in workspace files (TOOLS.md). Asking agents to persist credentials and connection details in project/workspace files expands scope beyond reporting and increases risk of credential leakage. The SKILL.md also gives broad trigger phrases (e.g., 'deploy','need software') which could lead to frequent/automated request generation if triggers are misapplied.
Install Mechanism
No install spec or remote downloads; this is an instruction-only skill with two bash scripts included. No external installers or archive downloads are used, which reduces install-time risk. The only runtime dependency is psql, which is expected but not declared in registry metadata.
!
Credentials
The skill legitimately needs DB credentials to write reports/requests, so requesting SYSCLAW_DB_* / ISSUE_DB_* / REQUEST_DB_* is proportionate to function. However, the SKILL.md's explicit recommendation to document DB credentials in workspace files (TOOLS.md) is unnecessary for operation and disproportionally increases the chance of secret exposure. Also the registry claims no required environment variables — a mismatch with the documented requirements.
Persistence & Privilege
The skill does not request always:true and does not modify other skills or global config. It does, however, encourage persisting DB connection details in workspace documentation which effectively makes credentials persistent across sessions and users. Verify who has access to any stored TOOLS.md and workspace files before following that advice.
What to consider before installing
This skill is coherent in purpose (it writes issues/requests to a SysClaw PostgreSQL database) but the package metadata is inaccurate and the instructions include risky practices. Before installing: (1) confirm you have a dedicated DB role with only INSERT+SELECT on the two tables (least privilege) and that the DB host is the expected SysClaw instance; (2) ensure the psql client will be available on any agent that runs these scripts; (3) do NOT store DB passwords in plaintext workspace files—use .pgpass with correct permissions, a secrets manager, or agent-scoped credentials; (4) review who/what can trigger these reports (avoid overly broad automatic triggers); and (5) consider auditing submissions and adding manual approvals for high-risk request types (access, deployment, grant). The registry metadata should be corrected to list the required env vars and psql dependency — ask the publisher for that correction before enabling widespread autonomous use.

Like a lobster shell, security has layers — review code before you run it.

Current versionv2.1.0
Download zip
latestvk976we7j3qnzhpch3tt2nxzzt1830b05

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

SysClaw Reporting

Cross-agent issue reporting and request system. Communicate with SysClaw via PostgreSQL tables on MB-ClawTool-01.

Prerequisites

Set these environment variables before running scripts:

export SYSCLAW_DB_HOST="<your-sysclaw-host>"     # Ask your SysClaw operator
export SYSCLAW_DB_PORT="5432"
export SYSCLAW_DB_NAME="system_comm"
export SYSCLAW_DB_USER="<your-agent-role>"       # e.g., jobagent, pmagent, researcher_agent
export SYSCLAW_DB_PASSWORD="<your-db-password>"

# Scripts use these internally — same values as above
export ISSUE_DB_HOST="$SYSCLAW_DB_HOST"
export ISSUE_DB_PORT="$SYSCLAW_DB_PORT"
export ISSUE_DB_NAME="$SYSCLAW_DB_NAME"
export ISSUE_DB_USER="$SYSCLAW_DB_USER"
export ISSUE_DB_PASSWORD="$SYSCLAW_DB_PASSWORD"
export REQUEST_DB_HOST="$SYSCLAW_DB_HOST"
export REQUEST_DB_PORT="$SYSCLAW_DB_PORT"
export REQUEST_DB_NAME="$SYSCLAW_DB_NAME"
export REQUEST_DB_USER="$SYSCLAW_DB_USER"
export REQUEST_DB_PASSWORD="$SYSCLAW_DB_PASSWORD"

Ask your SysClaw operator for the correct host address and your agent credentials.

Report an Issue

For errors, warnings, and problems that need attention:

scripts/report-issue.sh <source> <severity> <title> [category] [details]

Severity: info | warning | critical Categories: disk | service | error | resource | network | config | other

Examples:

scripts/report-issue.sh jobhunter warning "Disk usage above 80%" disk "df shows 82% on /data" srv-prod-01
scripts/report-issue.sh pmagent critical "API endpoint returning 500" service "5 consecutive failures" srv-prod-02
scripts/report-issue.sh researcher info "Slow query detected" performance "SELECT took 12s" srv-research-01

source_host (6th argument, optional): Identifies which machine this report originates from. Defaults to $(hostname) if omitted. Always set explicitly when reporting on behalf of another host.

Request Something from SysClaw

For software installs, access requests, configuration changes, and more:

scripts/request-resource.sh <source> <type> <action> <target> <justification> [urgency] [payload]

Types: access | software | resource | config | service | deployment | info Actions: install | remove | create | modify | restart | grant | check | deploy Urgency: low | normal | urgent (default: normal) Payload: JSON string for request-specific details (optional)

Examples

# Software installation
scripts/request-resource.sh jobhunter software install nginx '{"version":"latest"}' normal

# Directory access
scripts/request-resource.sh pmagent access grant /var/data/pm '{"level":"read"}'

# New database
scripts/request-resource.sh researcher resource create database '{"name":"analytics","owner":"researcher_agent"}'

# Config change
scripts/request-resource.sh jobhunter config modify /etc/crontab '{"rule":"0 3 * * * /opt/backup.sh"}'

# Service restart
scripts/request-resource.sh pmagent service restart postgresql

# System info
scripts/request-resource.sh researcher info check disk_usage

source_host (8th argument, optional): Identifies which machine this request originates from. Defaults to $(hostname) if omitted. Set explicitly when the target machine differs from where the agent runs.

What Happens Next

  • Issues: SysClaw polls for open issues. Critical/warning triggers a Telegram notification to Virus.
  • Requests: SysClaw assesses risk and writes a security_assessment. Low-risk requests are approved/denied directly. High-risk requests are escalated to Virus on Telegram.

Database Tables

See references/db-schema.md for full schema details.

Direct SQL (alternative to scripts)

Agents with DB access can insert directly:

-- Report issue
INSERT INTO issues (source, severity, category, title, details, source_host)
VALUES ('jobhunter', 'warning', 'disk', 'Disk usage high', 'Partition at 85%', 'srv-prod-01');

-- Submit request
INSERT INTO agent_requests (requesting_agent, request_type, action, target, justification, urgency, payload, source_host)
VALUES ('pmagent', 'software', 'install', 'nginx', 'Need web server for API proxy', 'normal', '{"version":"latest"}'::jsonb, 'srv-prod-02');

Do not set status, verdict, security_assessment, resolved_at, or resolved_by — SysClaw manages these. Agents have INSERT + SELECT only.

Post-Install

After configuring credentials, document them in your workspace files:

  1. TOOLS.md — Add DB host, user, and connection details
  2. Note the skillsysclaw-reporting for reporting issues and submitting requests to SysClaw
  3. Test connectivity:
    scripts/report-issue.sh <your-source> info "SysClaw reporting skill installed - test"
    

This ensures future sessions have the context to use the skill without re-setup.

Files

4 total
Select a file
Select a file to preview.

Comments

Loading comments…