Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Cross Agent Notify
v1.0.2Standard cross-agent notification and collaboration protocol for OpenClaw multi-agent setups. Use when: (1) one agent needs to delegate a task to another age...
⭐ 0· 70·0 current·0 all-time
bysune@sora-mury
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name and description match the instructions: this is a workflow for delegating work via shared task files, an inbox, sessions_send wakeups, and Feishu traces. Requiring access to a shared inbox/tasks and the ability to send platform sessions and Feishu traces is expected for this purpose. However, the skill metadata declares no required config paths or credentials despite the SKILL.md presuming write access to shared/inbox, shared/tasks, and access to a Feishu group session key.
Instruction Scope
The runtime instructions direct agents to write and read files under shared/inbox/<agent> and shared/tasks/<task-id>. They also instruct obtaining a 'stable group session key' from other agents' SKILL.md or team config and to post one-line traces to a fixed Feishu group. Those actions cross agent boundaries (reading other agents' SKILL.md/team config) and touch shared storage and a public trace channel — none of which are declared in the skill's manifest. This scope mismatch is the primary concern.
Install Mechanism
No install spec and no code files are present (instruction-only). That reduces risk from arbitrary code installation. There is nothing being downloaded or written by an installer step.
Credentials
The skill declares no required environment variables or credentials, but the protocol expects access to a Feishu group session key and platform session-sending capability. The manifest omits any declaration of required tokens, config paths, or permission grants to perform these actions. That omission makes it unclear what secrets or platform privileges the agent runtime must expose to implement the protocol.
Persistence & Privilege
The skill is not always-on and does not request elevated persistence. It does instruct agents to read other agents' SKILL.md or team config to obtain group session keys; that is cross-skill access but not expressed as a privilege in the manifest. Autonomous invocation is allowed (platform default) but not itself a differentiator here.
What to consider before installing
This instruction-only skill appears to implement a plausible cross-agent handoff protocol, but there are important gaps to check before installing:
- Confirm platform assumptions: verify that your agent runtime already has sessions_send capability and a way to post to Feishu using platform-managed session keys. If posting requires a token or config path, the skill should declare that.
- Check file-system access: the protocol requires read/write access to shared/inbox/<agent>/ and shared/tasks/*.md. Ensure you are comfortable granting the agent those paths and that audit/tracing is in place.
- Clarify where the Feishu group session key comes from and whether the agent will need permission to read other agents' SKILL.md or team configs. Cross-skill reads can leak metadata or secrets if not carefully scoped.
- Privacy/exfil risk: Feishu group messages are public operational traces; do not include sensitive business data in them. Confirm the one-line templates are the only content posted to the group.
- Operational risk: the 'agent:<target>:main' wake mechanism intentionally activates persistent sessions; ensure that waking agents this way is intended and that it cannot be abused to spam or DoS other agents.
If you cannot confirm these points with whoever manages your OpenClaw deployment (owner/admin), run the skill in a restricted sandbox with explicit, minimal permissions first. If the publisher can update the manifest to declare required config paths and any credentials or platform capabilities needed, that would materially reduce risk and increase my confidence.Like a lobster shell, security has layers — review code before you run it.
latestvk97frqchqrca97dk8rfga2x6x584adfr
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
