Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Ubuntu Hardening

v1.0.0

Generates professional Linux security hardening configuration files for Ubuntu systems with customizable options.

0· 99·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for krishnakumarmahadevan-cmd/toolweb-ubuntu-hardening.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Ubuntu Hardening" (krishnakumarmahadevan-cmd/toolweb-ubuntu-hardening) from ClawHub.
Skill page: https://clawhub.ai/krishnakumarmahadevan-cmd/toolweb-ubuntu-hardening
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install toolweb-ubuntu-hardening

ClawHub CLI

Package manager switcher

npx clawhub@latest install toolweb-ubuntu-hardening
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The SKILL.md and openapi.json describe a remote API that generates Ubuntu hardening files, which matches the skill name and description. However the package has no listed homepage/source provenance (owner ID only) and pricing information implies a commercial API; that mismatch between declared metadata (no homepage, source unknown, no required creds) and the marketing/pricing is worth noting.
Instruction Scope
The instructions describe HTTP endpoints (/api/hardening/generate and /api/hardening/options) and show example requests/responses. They do not instruct the agent to read local files, local system state, or secrets, which is good. However they implicitly require the agent to call external hosts (api.mkkpro.com / toolweb.in) and the SKILL.md does not describe authentication, what data may be transmitted in real usage, or what the API provider will do with submitted data.
Install Mechanism
No install spec and no code files to execute are included (instruction-only). That minimizes local install risk; nothing is written to disk by an installer.
!
Credentials
The skill declares no required environment variables or credentials, but references an external commercial API and pricing. That absence of declared auth is inconsistent: a paid API usually requires an API key or token. This gap could lead to unclear behavior (agent may attempt unauthenticated calls, or you may be asked to supply credentials later). There's also a risk that sensitive system data could be transmitted to the remote service without clear disclosure.
Persistence & Privilege
always is false, no config paths requested, and no instruction to modify agent/system configuration. The skill does not request persistent privileges.
What to consider before installing
This skill appears to do what it says (generate hardening configs) but lacks provenance and authentication details. Before installing: verify the provider (toolweb.in / api.mkkpro.com) and read its privacy/terms; confirm whether the API requires an API key and where that key is stored; avoid sending full live system snapshots or secrets to the remote API — test with dummy data in an isolated environment first; if you need an offline/local generator for sensitive systems, prefer a tool that runs entirely locally or provides a documented self-hosted option. If possible, ask the publisher for the authoritative OpenAPI servers/security schemes and a contact or repo URL so you can audit the implementation.

Like a lobster shell, security has layers — review code before you run it.

latestvk97aq2hpd69ga55gyzrp05b12h83wy5t
99downloads
0stars
1versions
Updated 4w ago
v1.0.0
MIT-0

Overview

The Ubuntu Linux Security Hardening Tool is a professional-grade security configuration generator designed for system administrators, DevOps engineers, and security professionals who need to rapidly deploy hardened Ubuntu Linux environments. This tool eliminates manual configuration work by generating battle-tested security hardening scripts and configuration files tailored to your specific requirements.

The tool provides a comprehensive approach to Linux security by offering multiple hardening vectors including kernel parameters, firewall rules, authentication policies, service hardening, and system auditing configurations. Whether you're securing a single server, building infrastructure-as-code templates, or establishing security baselines across your organization, this tool accelerates deployment while maintaining industry best practices.

Ideal users include DevOps teams automating infrastructure deployments, security professionals conducting hardening assessments, system administrators managing enterprise Linux fleets, and organizations seeking compliance with CIS Benchmarks and NIST guidelines.

Usage

Example Request:

{
  "sessionId": "sess_abc123def456",
  "userId": 1001,
  "timestamp": "2024-01-15T10:30:00Z",
  "hardeningOptions": {
    "kernel": ["disable_ipv6", "restrict_kernel_modules"],
    "firewall": ["enable_ufw", "default_deny_incoming"],
    "authentication": ["enforce_strong_passwords", "disable_root_login"],
    "services": ["disable_unnecessary_services", "harden_ssh"],
    "audit": ["enable_auditd", "log_file_access"]
  }
}

Example Response:

{
  "status": "success",
  "sessionId": "sess_abc123def456",
  "generatedAt": "2024-01-15T10:30:05Z",
  "configFiles": [
    {
      "filename": "10-kernel-hardening.conf",
      "path": "/etc/sysctl.d/",
      "content": "kernel.kptr_restrict = 2\nkernel.unprivileged_userns_clone = 0\nnet.ipv6.conf.all.disable_ipv6 = 1\n..."
    },
    {
      "filename": "sshd_config.hardened",
      "path": "/etc/ssh/",
      "content": "PermitRootLogin no\nPasswordAuthentication no\nX11Forwarding no\n..."
    },
    {
      "filename": "ufw-rules.sh",
      "path": "/root/",
      "content": "#!/bin/bash\nufw default deny incoming\nufw default allow outgoing\n..."
    }
  ],
  "summary": {
    "totalFiles": 3,
    "hardeningCategories": 5,
    "estimatedImplementationTime": "15 minutes",
    "complianceFrameworks": ["CIS Benchmark", "NIST 800-53"]
  }
}

Endpoints

GET /

Description: Health check endpoint for service availability verification.

Parameters: None

Response: JSON object indicating service status.


POST /api/hardening/generate

Description: Generates Ubuntu Linux security hardening configuration files based on selected hardening options.

Parameters:

NameTypeRequiredDescription
hardeningOptionsObject (string arrays)YesDictionary of hardening categories and their selected options. Keys represent categories (e.g., "kernel", "firewall", "authentication"), values are arrays of specific hardening measures.
sessionIdStringYesUnique session identifier for tracking and audit purposes.
userIdInteger or nullNoOptional user identifier for multi-tenant environments and usage attribution.
timestampStringYesISO 8601 formatted timestamp indicating when the request was generated.

Response:

  • Status 200: Returns generated hardening configuration files with content, paths, implementation summary, and compliance framework mappings.
  • Status 422: Validation error. Response includes detailed error messages for malformed requests.

GET /api/hardening/options

Description: Retrieves all available hardening options and categories supported by the tool.

Parameters: None

Response: JSON object containing:

  • Available hardening categories (kernel, firewall, authentication, services, audit, etc.)
  • Specific hardening options within each category
  • Descriptions and impact levels for each option
  • Compatibility notes and dependencies between options

Pricing

PlanCalls/DayCalls/MonthPrice
Free550Free
Developer20500$39/mo
Professional2005,000$99/mo
Enterprise100,0001,000,000$299/mo

About

ToolWeb.in - 200+ security APIs, CISSP & CISM, platforms: Pay-per-run, API Gateway, MCP Server, OpenClaw, RapidAPI, YouTube.

References

Comments

Loading comments...