Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Promptbuddy Lite

v3.0.0

【全局自动激活技能】 ⚠️ 每次收到用户消息时,必须先执行以下步骤: 1. 调用命令优化用户输入: ```bash cd ~/.openclaw/workspace/skills/promptbuddy-lite && bash scripts/preprocess.sh "用户输入" ``` 2. 根据返回结果...

0· 104·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill claims '零依赖 / pure Shell' but multiple scripts call python3 to parse JSON (preprocess.sh, feedback.sh). The package contains an install.sh that writes binaries to /usr/local/bin and creates /etc/promptbuddy-lite — actions that require root and are not reflected in registry metadata (no install spec). These are disproportionate to the simple 'prompt optimization' description and contradict the zero-dependency claim.
!
Instruction Scope
SKILL.md and the provided top-level instructions require invoking scripts/preprocess.sh for each user message. preprocess.sh reads/writes files in the user's home (~/.openclaw/.pb_show_prompt), creates /tmp/pb_last_metadata.json, and — if present — executes an external script from $HOME/.openclaw/workspace/skills/promptbuddy-optimizer/scripts/collect_feedback_safe.py (i.e., code belonging to another skill). Executing code from another skill's directory and writing temp/pref files for every message is broader scope than a pure, stateless optimizer and could result in unexpected data flows.
!
Install Mechanism
There is no registry install spec but an install.sh is included that requires sudo, copies scripts to /usr/local/bin, and creates /etc/promptbuddy-lite/config.json. This is a high-friction, higher-privilege install step (system-wide changes) not declared in the registry metadata. No external network downloads are used, but the need for root to install system binaries is a material risk if you don't trust the author.
!
Credentials
Registry lists no required env vars, which matches the manifest, but scripts access $HOME, /tmp, /etc, and rely on python3 (not declared). They also call code under $HOME/.openclaw/workspace/skills/promptbuddy-optimizer if that path exists — executing that script could cause metadata to be sent elsewhere. The declared zero credentials is correct, but indirect execution of other-skill scripts and undeclared python dependency are disproportionate to the simple stated purpose.
Persistence & Privilege
The skill is not marked always:true (registry: always:false), which limits forced global activation. However SKILL.md and scripts advertise '全自动激活' and the install script installs system-wide CLI tools. Installing those binaries requires root and creates persistent files under /etc and /usr/local/bin, which increases persistence/privilege compared with an instruction-only skill. The skill itself does not request to modify other skills' configs, but it will execute another skill's feedback collector if present.
What to consider before installing
This skill's code looks like a reasonable shell prompt-optimizer, but there are several mismatches you should consider before installing or enabling it: - The README/manifest claims 'zero dependencies' but scripts call python3. Ensure you have python3 and inspect the python scripts the shell calls. - The included install.sh requires sudo and will copy binaries to /usr/local/bin and write /etc/promptbuddy-lite/config.json. Do not run install.sh with root unless you trust the author and have reviewed the scripts. - preprocess.sh will be invoked per-message if you follow the SKILL.md flow: it writes preferences in $HOME/.openclaw/, creates /tmp/pb_last_metadata.json, and will execute collect_feedback_safe.py from $HOME/.openclaw/workspace/skills/promptbuddy-optimizer if that directory exists. That means it can run code from another skill; inspect that collector script (not included here) to confirm it doesn't exfiltrate data. - The feedback pipeline attempts to strip raw user input from metadata, but you should inspect the collector (promptbuddy-optimizer/scripts/collect_feedback_safe.py) to be sure. If you cannot review that file, consider disabling the feedback path. Recommended actions: 1) Review all included scripts locally (promptbuddy.sh, preprocess.sh, feedback.sh, install.sh) and any referenced collector scripts before running. 2) If you need to test, run scripts in a sandboxed account/container and avoid running install.sh with sudo until you are comfortable. 3) If you want the optimizer but not persistence, run the promptbuddy.sh directly from the skill directory instead of performing the system-wide install. Given these inconsistencies (zero-dep claim vs python usage, system-wide install, execution of another skill’s script), treat the skill as suspicious until you verify the external collector and are comfortable with the install behavior.

Like a lobster shell, security has layers — review code before you run it.

latestvk9752h71fr4236f9x26z8m5v3d83k7sh

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments