Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Interpersonal Knowledge Layer

v0.1.0

Interpersonal Knowledge Layer — a per-contact permission system for agent-to-agent information sharing. Use when: (1) another agent or user requests personal...

0· 43·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the SKILL.md, reference files, and setup script. No unrelated environment variables, binaries, or remote endpoints are requested. The included setup.sh only creates local JSON files consistent with the stated purpose.
Instruction Scope
Runtime instructions are narrowly scoped to: create/manage ikl/ files, check permissions, prompt the user when needed, and write audit entries. They do not instruct contacting external endpoints, reading unrelated system files, or requiring unrelated credentials. Note: correct operation assumes the agent has message metadata (sender/platform IDs) available to match against contacts.
Install Mechanism
No remote install or package downloads. The only code is a local setup.sh that creates starter JSON files in workspace/ikl/. This is low-risk (no external code execution or network fetches).
Credentials
The skill requests no environment credentials (none declared). However, it stores sensitive user information and also logs the exact shared values into audit.json when responses are allowed — this is proportionate to an audit feature but creates a local sensitivity surface: audit.json and knowledge.json will contain plaintext personal data unless the user encrypts or protects them.
Persistence & Privilege
always is false and model invocation is allowed (normal). The skill only writes files within workspace/ikl/ (its own scope). It does not modify other skills or system-wide settings.
Scan Findings in Context
[ignore-previous-instructions] expected: The pattern was detected in SKILL.md. In context the phrase appears as part of the skill's defensive guidance (explicitly instructing the agent to treat such prompt-injection attempts as stranger-level and flag them). That said, occurrences of this phrase in skill text are a common sign-warn for prompt injection and should be treated carefully — here it is used to teach resistance rather than to bypass controls.
Assessment
This skill appears coherent and does what it says: it creates and enforces a per-contact permission gate by storing contacts, permissions, knowledge, and an audit log in a local ikl/ directory. Before installing, consider the following: (1) ikl/ will hold sensitive data (knowledge.json and audit.json may include exact shared values) — ensure that directory is access-controlled or encrypted and that retention/rotation policies are defined; (2) the agent must have trustworthy message metadata (platform IDs) to safely map senders to contacts — verify your agent supplies this and you should verify contact identifiers during setup; (3) audit.json intentionally records what was shared for traceability, which increases local exposure if logs are not protected; (4) the SKILL.md contains guidance on prompt-injection resistance (the scanner flagged that text) — this is defensive, but you should still test the agent's actual resistance to injected messages in your environment; (5) review and adjust default permission matrix to match your privacy preferences; and (6) treat the skill as a local policy enforcer only — it does not provide remote verification of other agents' identities, so keep contact mappings updated. If you need help hardening storage (encryption, secure ACLs) or testing the agent's enforcement, do that before adding sensitive data.
!
references/security-design.md:6
Prompt-injection style instruction pattern detected.
About static analysis
These patterns were detected by automated regex scanning. They may be normal for skills that integrate with external APIs. Check the VirusTotal and OpenClaw results above for context-aware analysis.

Like a lobster shell, security has layers — review code before you run it.

latestvk975xs668zyg55x06mqzvn6xms83scba

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments