Domain Dns Ops
PassAudited by VirusTotal on May 13, 2026.
Overview
Type: OpenClaw Skill Name: domain-dns-ops Version: 1.0.0 The skill is classified as suspicious due to its reliance on executing arbitrary local scripts (`~/Projects/manager/bin/*`) and sourcing local files (`~/Projects/manager/profile`, `~/.profile`) whose contents are not provided. While these actions are plausibly needed for the stated purpose of 'Domain/DNS ops' and managing a local Git repository, they introduce a significant trust boundary. The `SKILL.md` also instructs the agent to handle sensitive Cloudflare API tokens and perform `git push` operations, which are high-risk capabilities, even if the instructions themselves do not explicitly direct malicious behavior.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A mistaken or overbroad action could reroute a domain, break HTTPS or redirects, change public traffic behavior, or disable a Cloudflare bot-protection setting.
These are direct registrar and Cloudflare mutation paths that can reroute domains, alter redirects, deploy/bind routes, or disable a Cloudflare protection setting. The artifacts do not provide an explicit confirmation gate for these account changes comparable to the separate 'Push only when explicitly asked' git guardrail.
If registrar = Namecheap: `cd ~/Projects/manager && source profile && bin/namecheap-set-ns example.com ...`; ... Page Rules: use the `cli4 --post ... /pagerules` template; ... `bin/cloudflare-ai-bots disable`.
Require explicit user approval for each live registrar or Cloudflare mutation, including the domain, account, intended change, and rollback plan; prefer dry-run/status checks before applying changes.
The agent may operate with whatever Cloudflare or registrar privileges are present in the user's shell profiles, which could include broad authority over domains and account settings.
The skill instructs use of ambient local profile files and API tokens for Cloudflare and registrar operations. The supplied metadata declares no required credentials or environment variables, and the artifacts do not bound token scopes or which account authority may be used.
`source ~/.profile` (prefer `CLOUDFLARE_API_TOKEN`; `CF_API_TOKEN` fallback) ... `cd ~/Projects/manager && source profile && bin/namecheap-set-ns ...`
Declare the required credentials and minimum scopes, avoid sourcing broad shell profiles when possible, use narrowly scoped tokens, and confirm the active account and domain before any write operation.
The safety of the skill depends heavily on the contents and current state of ~/Projects/manager, including helper scripts that may use credentials and make live changes.
The main behavior depends on local repo scripts and documents that are not part of the supplied skill artifacts. This is disclosed and purpose-aligned, but users need to trust and review that local repo because it drives the actual account operations.
This skill is a thin router: use `~/Projects/manager` as truth, run the repo scripts, follow the checklists.
Inspect and maintain ~/Projects/manager, especially bin/namecheap-set-ns, bin/cloudflare-ai-bots, DNS.md, and redirect-worker files, before relying on this skill for live domain operations.
