Skylv Agent Settings Manager

PassAudited by VirusTotal on May 1, 2026.

Overview

Type: OpenClaw Skill Name: skylv-agent-settings-manager Version: 1.0.0 The bundle contains metadata and documentation (SKILL.md) for a configuration management tool named 'agent-settings-manager'. While the documentation describes high-privilege operations such as secret rotation, environment syncing via Git, and configuration overrides, these are standard features for the stated purpose. No executable code (e.g., the referenced 'config.js') is included in the bundle, and the documentation contains no evidence of malicious intent, prompt injection, or data exfiltration logic.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or unreviewed command could change production behavior or invalidate credentials.

Why it was flagged

The skill documents commands that can affect production configuration and rotate secrets. These are aligned with configuration management and shown as user-run examples, but they are high-impact operations.

Skill content
node config.js env promote --from staging --to production --dry-run
node config.js secrets rotate --env production --keys API_KEY,DB_PASSWORD
Recommendation

Use dry-run mode, require explicit approval for production changes, and confirm backups or rollback procedures before running mutation commands.

What this means

If connected to real secret stores, the agent could view, set, or rotate sensitive credentials depending on the external tool's permissions.

Why it was flagged

The skill explicitly includes secret management through a Vault-like provider. This is expected for the stated purpose, but it means the agent may need access to sensitive secret-management permissions.

Skill content
"secrets": {
  "provider": "vault",
  "rotation": "90d",
  "scanForLeaks": true
}
Recommendation

Use scoped credentials, separate dev/staging/production access, avoid pasting raw secrets into chat, and audit any secret rotation actions.

What this means

Users may need to supply or trust an external/local config.js, whose behavior was not assessed in this review.

Why it was flagged

The documented workflow relies on a config.js helper, but the supplied artifact set is instruction-only and does not include that file, so the actual implementation and provenance are not reviewable here.

Skill content
node config.js validate --file config.json --schema config.schema.json
Recommendation

Only run a config.js implementation from a trusted source and review its code, dependencies, and permissions before using it with production configs or secrets.

What this means

Old configuration values, including sensitive or unsafe settings if not filtered, could remain available through history or rollback.

Why it was flagged

The skill describes persistent configuration history. Since the same skill also handles environment variables and secrets, users should ensure sensitive values are excluded or protected in stored versions.

Skill content
Full version history with diff and rollback capabilities.
Recommendation

Keep secrets out of version history, encrypt stored configuration data, and review rollback targets before reusing older configurations.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

A malformed or malicious configuration commit could affect multiple environments or agents if auto-sync and auto-reload are enabled.

Why it was flagged

The skill supports syncing production configuration from Git and automatically reloading on changes. That is coherent for config management, but a bad config change could propagate quickly.

Skill content
node config.js sync --source git --repo org/configs --path /production
node config.js sync --watch --auto-reload --debounce 5s
Recommendation

Use branch protection, signed/reviewed config changes, staged rollout, and disable auto-reload for critical production systems unless monitored.