Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Task Resume
v1.3.0Automatic interrupted-task resume workflow with queueing and recovery. Use when a user asks to resume interrupted work after temporary context switches, prot...
⭐ 0· 612·1 current·1 all-time
byRichardSun@richardsun700
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description align with the code and instructions: the included script implements a FIFO queue persisted at memory/task-resume-queue.json and provides add/pop/list/status/clear/recover commands. Requiring a workspace-global (cross-session) queue file and a recover-from-log helper is consistent with the stated goal of cross-session resume.
Instruction Scope
SKILL.md requires message-time enforcement (enqueue before handling any new user message), shared queue usage across sessions, and recommends a watchdog cron that will 'auto-continue' tasks every 30 minutes. It also documents recovering from arbitrary session .jsonl logs (reads a path like ~/.openclaw/agents/main/sessions/<session>.jsonl). Those instructions expand the agent's scope beyond simple bookkeeping: they enable cross-session state mixing and periodic autonomous execution that may act without explicit user confirmation. The recover command reads arbitrary file paths specified at runtime, which could expose local session data if misused.
Install Mechanism
No install spec; this is instruction-plus-script only. Nothing is downloaded from the network or written to unusual system locations by an installer. Risk surface comes only from the included script's runtime behavior.
Credentials
The skill declares no required environment variables or credentials. However, it persists a workspace-global JSON queue (memory/task-resume-queue.json) that is shared across sessions/clones and could leak context between sessions. The SKILL.md explicitly warns not to store secrets in queue content; that guidance is necessary but relies on correct operator behavior.
Persistence & Privilege
The skill is not 'always: true', but the SKILL.md encourages adding a watchdog cron/heartbeat that would run periodically and 'auto-continue' tasks. Combined with normal autonomous invocation, that pattern grants the skill potential ongoing background action (periodic checks and automatic continuation) and cross-session persistence via the shared queue file. That operational model can increase blast radius if the skill is granted broad invoke privileges.
What to consider before installing
This skill appears to implement what it says (a cross-session interrupted-task queue) but has several operational risks you should consider before installing:
- Shared queue: It stores queued tasks in a workspace-global file (memory/task-resume-queue.json) shared across main/clone/group sessions. If you have multiple users or isolated contexts in the same workspace, tasks and their context could be visible across sessions. Avoid putting secrets in task context.
- Log reading: The recover command can read arbitrary session .jsonl log files (e.g., under ~/.openclaw). Ensure you trust the skill and its invocations before allowing it to read local logs, since those logs may contain sensitive content.
- Autonomous/cron auto-continue: The README and SKILL.md recommend a watchdog cron that automatically 'continues' tasks. That behavior can cause the agent to take actions or send progress messages automatically. If you need strict user confirmation for actions, do not enable the watchdog or restrict how/when the skill is invoked.
- Operational controls: If you decide to install, restrict who/what can call the skill, avoid storing secrets in queue entries, and consider placing the workspace memory directory in a location with appropriate access controls. Review any automation (cron/heartbeat) separately and prefer manual invocation when in doubt.
If you want me to, I can suggest a hardened variant (e.g., per-session queue files, explicit opt-in for watchdog mode, and an allowlist for recover log paths) to reduce these risks.Like a lobster shell, security has layers — review code before you run it.
latestvk97ax650cfftc7xct11ham3fkx820xs5
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
