Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Moses Roles
v1.0.3MO§ES™ Role Hierarchy — Defines Primary, Secondary, Observer agents with enforced sequencing. Primary leads, Secondary validates, Observer flags. Enforces Pr...
⭐ 0· 241·1 current·1 all-time
byburnmydays@sunrisesillneversee
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md behavior (enforcing Primary→Secondary→Observer, reading a governance state file, writing AGENTS.md, and logging violations) is coherent with the 'role hierarchy' purpose. However the registry metadata provided to the platform omitted items that SKILL.md declares (stateDirs, a required python3 binary, and an optional MOSES_OPERATOR_SECRET), creating a metadata mismatch.
Instruction Scope
Instructions tell agents to read ~/.openclaw/governance/state.json before every response and to run a local script at ~/.openclaw/workspace/skills/moses-governance/scripts/audit_stub.py to log violations. Reading local governance state and executing a script from another (undeclared) skill bundle are scope-appropriate for governance but risky: they rely on local files and third-party code whose existence, content, and safety are not verified in the manifest. 'Notify operator' is underspecified, giving the agent broad discretion.
Install Mechanism
No install spec (instruction-only) means nothing new is written by default, which is lower risk. But the skill assumes other components exist on disk (the moses-governance scripts and a governance directory). Because those components are not installed or validated by this skill, the runtime will attempt to execute local code of unknown provenance.
Credentials
The SKILL.md lists an optional MOSES_OPERATOR_SECRET (sensitive) for HMAC signing, claimed 'Never transmitted.' The registry-level requirements did not list this variable. An optional local signing secret is plausible for an operator override, but the manifest/registry inconsistency and the unverifiable claim that it is never transmitted merit caution.
Persistence & Privilege
The skill asks the operator to add entries to ~/.openclaw/workspace/AGENTS.md and will call a logging script in workspace paths — this modifies workspace state but does not assert always:true or system-wide config changes. Modifying workspace files is expected for governance, but it does create persistent changes to agent behaviour; combined with the external script execution, that persistence increases risk.
What to consider before installing
This skill's behavior (load ~/.openclaw/governance/state.json, enforce sequencing, run a logging script under ~/.openclaw/workspace/skills/moses-governance, and update AGENTS.md) is consistent with a governance role manager — but note these concerns before installing:
- Metadata mismatch: the platform registry claims no required stateDirs, binaries, or env vars, yet SKILL.md declares a stateDir (~/.openclaw/governance), python3, and an optional MOSES_OPERATOR_SECRET. Ask the publisher to fix the manifest so requirements are explicit.
- Undeclared dependency: the skill invokes ~/.openclaw/workspace/skills/moses-governance/scripts/audit_stub.py. Verify that the moses-governance bundle is trustworthy and inspect that script's code before allowing this skill to execute it. Prefer a skill that declares such dependencies or bundles the logging implementation.
- Local file access & execution: the skill reads a local state.json and executes a local Python script. Confirm you control those files and back them up; check for unexpected content or injected code.
- Optional secret: MOSES_OPERATOR_SECRET is marked optional and claimed 'Never transmitted' — treat that as a claim, not a guarantee. Ask how the secret is used and whether it is stored or transmitted.
- Ambiguity on 'notify operator': ask the author what mechanism is used to notify the operator so you can assess privacy/telemetry concerns.
What would reduce risk: corrected registry metadata, an explicit declared dependency on moses-governance (or bundled/verified audit code), and documentation showing the exact 'notify operator' mechanism and the audit_stub.py source. If those are provided and reviewed, the skill would likely be coherent and could be considered benign.Like a lobster shell, security has layers — review code before you run it.
latestvk97eddcxwhrtr27gcr6g951tm98434ed
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
👥 Clawdis
Environment variables
MOSES_OPERATOR_SECREToptional