Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Unifi Skill

v1.0.0

Query and monitor UniFi network via local gateway API (Cloud Gateway Ultra / UniFi OS). Use when the user asks to "check UniFi", "list UniFi devices", "show...

0· 7·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's purpose (read-only UniFi monitoring) matches the included scripts (they perform GET requests to UniFi OS endpoints). However the registry metadata declares no required credentials, while SKILL.md and the scripts require a local credentials file (~/.openclaw/credentials/unifi.json) containing username/password — that's an explicit mismatch in what the skill asks for vs what the registry says.
!
Instruction Scope
Runtime instructions and scripts operate within the expected scope (login to local UniFi gateway, GET-only calls listed in references). However dashboard.sh unconditionally creates a dashboard_debug_dump.json (dumping many API responses) which persists sensitive network data to disk. Scripts also use curl -k to skip TLS verification by default. The scripts read a plaintext credentials file in the user's home directory. These behaviors expand the skill's scope beyond transient monitoring and introduce data persistence and weaker TLS checks.
Install Mechanism
This is an instruction-only skill with bundled shell scripts and no install spec or remote downloads. Required binaries (curl, jq) are reasonable and declared. No external installers or URLs are used, so install risk is low.
!
Credentials
The skill requires a local UniFi username/password (documented in SKILL.md) stored at ~/.openclaw/credentials/unifi.json, but the registry metadata lists no primary credential or required env vars — an incoherence. The scripts also accept optional env vars (UNIFI_CONFIG_FILE, UNIFI_OUTPUT_FILE, UNIFI_COOKIE_FILE) not declared in registry metadata. Requesting a local admin credential is proportionate for the stated purpose, but the lack of declared credentials and the expectation to store plaintext creds in the home directory are notable concerns.
!
Persistence & Privilege
The skill does not request 'always:true' or permanent platform-level privileges. However it writes a dashboard_debug_dump.json (full JSON dump of API responses) into the working directory, which may unintentionally persist sensitive network topology and configuration data. Temporary cookie files are created but cleaned up; the persistent debug dump is the main privilege/persistence risk.
What to consider before installing
This skill generally does what it claims (read-only UniFi monitoring), but there are several things to check before installing or running it: - Metadata mismatch: The registry claims no credentials are required, but the skill expects a credentials file (~/.openclaw/credentials/unifi.json) containing a UniFi username/password. Confirm you are comfortable storing a local UniFi account for this skill and that the registry/package owner should have declared this requirement. - Use a minimally privileged account: Create a dedicated local admin/read-only account for monitoring where possible. Do NOT use your Ubiquiti cloud account. If possible, create an account with the least privilege required. - Protect the credentials file: Ensure ~/.openclaw/credentials/unifi.json has restrictive file permissions (e.g., chmod 600) and is stored only on the machine running the skill. - Sensitive data persisted to disk: dashboard.sh writes dashboard_debug_dump.json containing aggregated API responses. Either remove or secure that file, run the script in a controlled directory, or set UNIFI_OUTPUT_FILE so you control where output is written. Review and delete any debug dumps before sharing or backing up the directory. - TLS verification disabled: The scripts use curl -k to bypass certificate checks (documented as because UniFi often uses self-signed certs). If possible, import or trust the gateway certificate and modify scripts to avoid -k to prevent man-in-the-middle risks. - Verify endpoints and scope: The skill claims GET-only usage and the references list only read endpoints, but some 'rest/*' endpoints expose firewall rules, port forwards, and other configuration data which may be sensitive. Confirm you are comfortable with the particular data these endpoints return. - Registry hygiene: Consider asking the skill author or registry maintainer to update the package metadata to declare the required credential/config path and any optional env vars, and to document the debug dump behavior and TLS choices. If you need a safer setup: run the scripts from an isolated admin machine, create a least-privileged local account, set proper file permissions, and remove or relocate dashboard_debug_dump.json after each run.

Like a lobster shell, security has layers — review code before you run it.

latestvk970ygrdt1f9r40pbg1p1axkqs8499gx

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📡 Clawdis
Binscurl, jq

Comments