Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Yaoyao Cloud Backup Homo
v1.0.0云端与外部备份同步套件 【首次自动引导】安装后首次访问即自动引导配置 【多云支持】IMA、WebDAV、S3、FTP/SFTP、Samba 等 【小白友好】全对话式操作,无需查看任何文档
⭐ 0· 7·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description (multi‑cloud backup / auto‑guide) matches the code: detectors, adapters (WebDAV, S3, SFTP, Samba, IMA), backup/restore and sync scripts. The set of credentials and files the code touches (secrets.env, env vars, local cloud client directories, /proc/mounts) are consistent with a backup/sync tool that auto-detects available endpoints.
Instruction Scope
SKILL.md explicitly tells users to provide emails, app passwords, AccessKey ID/Secret and other credentials via conversation and to store them in ~/.openclaw/credentials/secrets.env. It also claims '不收集用户敏感信息' (does not collect sensitive info) which contradicts instructions and code that parse secrets.env, environment variables, browser/config files and /proc/mounts. Prompting the user to paste secrets into chat broadens scope beyond what a safe auto‑config should do.
Install Mechanism
There is no remote install/download step or third‑party package pulled at install time: the repository includes Python scripts and an included publish.sh; no external archives or unknown URLs are fetched during install. This is lower risk from an installation/execution origin perspective.
Credentials
The skill does not declare required env vars in registry metadata, but the code reads many environment variables and an unencrypted secrets.env file for IMA, WebDAV, S3, FTP/SFTP, Samba, etc. These variables are relevant to the stated functionality, but the SKILL.md recommends using high‑privilege keys (e.g., 'Root AccessKey' for OSS) and storing plaintext credentials, which is disproportionate and risky. Also the skill inspects various user config directories and /proc/mounts — expected for detection but privacy sensitive.
Persistence & Privilege
The skill is not marked always: true and does not request persistent system-wide modifications in the manifest. It will read/write files under the user's ~/.openclaw workspace (secrets.env, backups) which is normal for an agent plugin of this kind.
What to consider before installing
This package appears to implement a multi‑cloud backup tool, but you should be cautious about secret handling before installing or using it:
- Do not paste passwords, AccessKey secrets, or private keys into chat with the agent unless you trust the skill and hosting environment; chat transcripts may be logged. Prefer creating limited-scope credentials (least privilege) for backup use, not root/master keys.
- The skill stores credentials in plaintext at ~/.openclaw/credentials/secrets.env by design. If you use it, restrict file permissions (chmod 600) or use an encrypted secrets mechanism. Consider keeping credentials in a secure vault instead.
- The auto-detection code scans home directories, browser/config files, environment variables and /proc/mounts to find cloud clients and mounts — this can leak information about other services on your machine. Review which detectors run and test in a sandbox if possible.
- Inspect the omitted files (memory_exporter.py and other truncated modules) before trusting the skill; they could export user content elsewhere. Confirm there are no hardcoded remote endpoints except the user‑provided service URLs.
- If you proceed, create service accounts with minimal required permissions (dedicated bucket, limited put/get rights), avoid using root-level credentials, and test uploads/downloads with non‑sensitive data first.
If you want a safer assessment, provide the full contents of the remaining/omitted scripts (memory_exporter.py and the rest) so I can check for hidden network endpoints, obfuscated code, or unexpected exfiltration behavior.Like a lobster shell, security has layers — review code before you run it.
latestvk97evdnb0p6h3xeg9kbqptrq0984ppyq
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
