Qclaw Env
PassAudited by VirusTotal on May 10, 2026.
Overview
Type: OpenClaw Skill Name: qclaw-env Version: 1.0.0 The qclaw-env skill bundle is a comprehensive environment diagnostic and installation tool for macOS and Windows. It possesses high-risk capabilities including checking for passwordless sudo access (sudo -n true), executing remote scripts via 'curl | bash' and 'Invoke-Expression' (PowerShell), installing system-level packages (.pkg, .msi), and modifying shell configuration files (~/.zshrc, ~/.zprofile). While these actions are clearly aligned with the stated purpose of setting up development environments and the bundle utilizes reputable mirror sources (e.g., USTC, Tsinghua, Huawei Cloud), the broad system-level access and the execution of remote payloads constitute significant security risks. No evidence of intentional malice or data exfiltration was found, but the tool's design allows for arbitrary code execution and system modification (SKILL.md, install-macos.md, install-windows.md).
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent following the manual could remove Homebrew and all Homebrew-installed tools on an Apple Silicon Mac, breaking the user’s development environment.
The provided static scan reports this destructive delete command appears in the macOS manual without an explicit confirmation gate. It can delete the entire Homebrew installation rather than a single target tool.
rm -rf /opt/homebrew # Apple Silicon
Do not allow this command to run automatically. Require explicit user confirmation, explain the impact, verify the exact path, and prefer official uninstall or repair steps.
If the remote installer or mirror is compromised or changes unexpectedly, the installation step could run unintended code.
The guide executes an unpinned remote PowerShell installer from a mirror. This is common for package-manager bootstrap, but it trusts the remote source at run time.
irm https://gitee.com/glsnames/scoop-installer/raw/master/bin/install.ps1 | iex
Prefer official sources when possible, review installer scripts, and verify checksums or signatures before running remote script pipelines.
Exposed or overly broad API keys could allow account use, data access, or unexpected charges.
The skill may guide users to configure provider API keys as environment variables. That is purpose-aligned for CLI setup, but those keys can grant account access.
配置 API Key、环境变量、PATH ... 第 4 层 环境变量 OPENAI_API_KEY / GEMINI_API_KEY / ...
Only configure keys for services you intend to use, use least-privilege and revocable keys, avoid pasting secrets into logs or chat, and rotate keys if exposed.
Future shells and installs may continue using modified PATH, mirror, proxy, or registry settings even after the immediate task is complete.
The manual persists shell and package-manager configuration changes that will affect future terminal sessions and future package installs.
cat >> ~/.zshrc ... export HOMEBREW_BREW_GIT_REMOTE=...; echo 'eval "$(/opt/homebrew/bin/brew shellenv)"' >> ~/.zprofile
Tell the user exactly which profile/config files were changed and provide simple rollback commands.
