Hydra Evolver

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill fits a homelab orchestration purpose, but it includes powerful provisioning scripts that execute remote installers and change host privileges without clear safeguards.

Install or invoke this only if you intentionally want an agent to help administer a homelab machine. Review provision.sh before running it, avoid broad Proxmox credentials, confirm every host-level change manually, and run network scans only on networks you control.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the provision command allows third-party installer scripts to make system-level changes to the machine.

Why it was flagged

The provisioning command executes mutable remote installer scripts without version pinning, checksums, or reviewed local copies.

Skill content
curl -fsSL https://get.docker.com | sh ... curl https://get.volta.sh | bash ... curl -fsSL https://tailscale.com/install.sh | sh
Recommendation

Review the installer sources before use, prefer pinned package-manager installs or checksummed downloads, and run provisioning manually with explicit approval.

What this means

If invoked on the wrong machine or by an agent without careful review, it can alter the host environment and installed software.

Why it was flagged

The exposed provisioning helper performs high-impact host mutations and global software installation with no dry run, confirmation prompt, OS guard, or rollback path.

Skill content
apt-get update && apt-get install -y curl; ... npm install -g openclaw
Recommendation

Require an explicit user confirmation for provisioning, add dry-run output, document supported OSes, and provide cleanup or rollback instructions.

What this means

Docker group access can grant broad control over the host through containers, so this changes the security posture of the machine.

Why it was flagged

The script persistently adds the sudo user to the Docker group, which materially changes local privilege boundaries.

Skill content
usermod -aG docker $SUDO_USER
Recommendation

Ask for explicit consent before changing user groups, explain the privilege implications, and provide a command to reverse the change.

What this means

A user may provide Proxmox credentials without clear documentation of the permissions needed or where they will be used.

Why it was flagged

The skill mentions Proxmox API credentials, but the registry metadata declares no required environment variables or primary credential and the reviewed code does not show clear scoping for token use.

Skill content
env: ["PVE_TOKEN_ID", "PVE_TOKEN_SECRET"]
Recommendation

Use a least-privilege Proxmox token, do not provide broad admin credentials, and require the skill to declare credential scope in metadata.

What this means

Content in PROJECTS.md or MEMORY.md can influence what the agent decides to investigate next.

Why it was flagged

The evolve helper reads persistent project/memory files and turns their contents into suggested follow-up instructions.

Skill content
memory_file = find_file('MEMORY.md', search_paths) ... "instruction": f"Read logs in {p.get('location', 'project dir')} to determine why '{name}' is paused."
Recommendation

Review generated evolution plans before acting on them and treat project/memory files as untrusted input unless you control them.

What this means

Local network discovery may reveal devices or services and could be unwanted on networks you do not administer.

Why it was flagged

The mesh_scan helper probes specific local network addresses for SSH and OpenClaw gateway ports.

Skill content
SUBNET = "192.168.0." ... sock.connect_ex((ip, 22)) ... sock.connect_ex((ip, 18789))
Recommendation

Run scans only on networks you own or have permission to assess, and document the target IP range before scanning.

What this means

Users may overestimate the skill's privacy or prompt-injection protections.

Why it was flagged

The provided artifacts do not show web-research functionality or implemented prompt-injection boundaries to substantiate this safety claim.

Skill content
"ZeroLeaks Hardened": Built-in boundaries to prevent prompt injection during web research.
Recommendation

Do not rely on this claim without implementation evidence; the author should either document the mechanism or remove the claim.