Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

SysGuard

v2.1.1

实时监控OpenClaw系统CPU、内存、磁盘及网关状态,支持健康检查、诊断报告、趋势图和缓存清理。

0· 126·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for steventsang18/sysguard.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "SysGuard" (steventsang18/sysguard) from ClawHub.
Skill page: https://clawhub.ai/steventsang18/sysguard
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install sysguard

ClawHub CLI

Package manager switcher

npx clawhub@latest install sysguard
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (monitor CPU/memory/disk/Gateway, health checks, diagnostics, trends, cache cleaning) align with the included shell scripts: health_check, diagnostics, trend, clean, monitor, notifier and UI formatting. The use of OpenClaw-specific commands (openclaw gateway probe/restart) is consistent with an OpenClaw system guardian.
!
Instruction Scope
Runtime instructions and scripts generally stay within monitoring and cleanup scope, but diagnostics/utility functions probe a hardcoded external endpoint (api.minimaxi.com) via curl/ping to measure API latency. This external network contact is not documented in SKILL.md and could leak reachability/latency information or be used as a beacon. The SKILL.md asserts 'zero-dependency' yet scripts rely on common utilities (curl, ping, pgrep, journalctl, bc, optionally jq) — jq is mentioned in code but not documented in the top-level description as an optional dependency.
Install Mechanism
No download/install spec is present (files included in the package). There are no external archives or installers pulled during install, so installation risk is low from a supply chain perspective. ClawHub one-click or git clone are the documented install options.
Credentials
The package declares no required env vars or credentials. It does, however, read and persist configuration (config/sysguard.conf) and supports FEISHU_WEBHOOK_URL / WECOM_WEBHOOK_URL for notifications — those webhook URLs would receive formatted system status and diagnostic messages. Defaults reference filesystem paths (/root/.openclaw, /mnt/vdc, /tmp for config when not run through the skill wrapper) which may be surprising; user should confirm/defaults are appropriate. No unrelated cloud credentials or secrets are requested.
Persistence & Privilege
The skill does not request permanent platform privileges (always:false). It can run a background monitor loop (nohup) if the user starts it, but it does not auto-enable itself across the system or modify other skills. It writes logs and history data under its data/logs and data/history directories (and can operate on /tmp/openclaw and system journal when cleaning).
What to consider before installing
What to check before installing: - The code appears to implement the advertised monitoring features, but review and (if needed) remove or replace the hardcoded external host (api.minimaxi.com) used for the 'API 响应超时' check — if you don't trust that host, it should be changed or removed. - Configure notification webhooks (FEISHU_WEBHOOK_URL / WECOM_WEBHOOK_URL) carefully — these receive system status and diagnostics. Only set them to endpoints you control. - Verify default paths (OPENCLAW_ROOT, DATA_DISK, BACKUP_ROOT, CONFIG_FILE) are appropriate for your system; the defaults point to /root/.openclaw and /mnt/vdc which might not exist or be sensitive. - The scripts call utilities such as curl, ping, pgrep, journalctl, bc and optionally jq; ensure those are available and acceptable on your host. 'jq' is required for trend charts if you want that feature. - The cleaner runs journalctl --vacuum-time and deletes files in /tmp/openclaw and historical JSONs; review the clean.sh logic and retention settings (HISTORY_RETENTION_DAYS) to avoid unintended deletions. - Run the scripts in a staging environment first and inspect what data is written and what network calls are made (especially outbound requests to webhooks and api.minimaxi.com). If you need, ask the author to document the api.minimaxi.com purpose or replace it with a configurable probe target. Overall: functionally coherent, but the undocumented external probe and a few imprecise claims ("zero-dependency") are reasons to inspect and possibly adjust configuration before production use.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c7vd5t3ayrc0kj2h93gs2zs83gfyk
126downloads
0stars
2versions
Updated 1mo ago
v2.1.1
MIT-0

SysGuard - OpenClaw 系统守护技能

🛡️ 守护你的 OpenClaw 系统

功能

  • 系统状态: CPU/内存/磁盘/Gateway 实时监控
  • 健康检查: 详细检测各项指标
  • 诊断报告: 8 大隐藏事件检测
  • 趋势图表: 纯文本可视化趋势
  • 缓存清理: 释放磁盘空间
  • 守护监控: 持续后台监控

指令

命令功能
sg系统状态 + 命令提示
sgc清理缓存
sgch健康检查
sgd诊断报告
sgt [小时]趋势图(默认12小时)
sgm守护监控

使用示例

sg        # 查看系统状态
sgc       # 清理缓存
sgch      # 运行健康检查
sgd       # 生成诊断报告
sgt 24    # 查看24小时趋势
sgm       # 启动守护监控

安装

方式一:ClawHub 一键安装(推荐)

clawhub install sysguard

方式二:GitHub 克隆

git clone https://github.com/Steventsang18/sysguard.git

安装完成后,所有用户在任何 IM 对话中直接说 sg 即可使用。

技术特点

  • 零依赖(纯 Shell)
  • < 2s 响应时间
  • IM 友好输出
  • 中文优先

版本: v2.1.0 作者: Steventsang18 许可证: MIT

Comments

Loading comments...