Pluribus

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: pluribus Version: 0.1.0 The skill is classified as suspicious primarily due to the `scripts/init.sh` file attempting to read `~/.config/moltbook/credentials.json`. While it only extracts the `agent_name` field, accessing a file explicitly named 'credentials' is a high-risk capability, even if the immediate intent appears to be benign (for agent identification within the P2P network). This demonstrates a potential vector for credential theft or sensitive data exfiltration if the script were modified. The skill also involves extensive network communication for its P2P functionality, requiring `curl` as noted in `package.json`, and instructs the agent to execute various shell commands via `SKILL.md` and `README.md` for setup and operation.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could end up running code that was not part of this registry submission and not covered by the static scan.

Why it was flagged

The submitted manifest does not include the top-level `pluribus` executable that these instructions make executable, add to PATH, and run. The core runtime would therefore come from an unpinned external GitHub clone rather than the reviewed artifact.

Skill content
git clone https://github.com/tanchunsiong/pluribus.git "$WORKSPACE/skills/pluribus"
chmod +x "$WORKSPACE/skills/pluribus/pluribus"
export PATH="$WORKSPACE/skills/pluribus:$PATH"
pluribus init
Recommendation

Only install from a reviewed, pinned release that includes the actual CLI, or inspect the external repository before adding it to PATH and running it.

What this means

The skill may read your local Moltbook profile to identify the node it creates.

Why it was flagged

The init script reads a local Moltbook credential/profile file to derive the agent name. The reviewed code only extracts `agent_name`, but it still touches a credential-named local config file that is not declared in registry requirements.

Skill content
AGENT_NAME=$(cat ~/.config/moltbook/credentials.json 2>/dev/null | jq -r '.agent_name // empty')
Recommendation

Check the Moltbook credentials file contents and prefer a version that clearly documents this access and limits it to non-secret identity fields.

What this means

Signals, offers, needs, and node details may be sent to other agents or through Moltbook when sync features are used.

Why it was flagged

The skill is explicitly designed to exchange outbox and signal data with peers over Moltbook DMs. This is purpose-aligned, but users should treat shared signals as data leaving the local workspace.

Skill content
Pull signals from peers, push your outbox:

```bash
pluribus sync
```

Uses Moltbook DMs as transport (Phase 1).
Recommendation

Do not place secrets or private user data in signals, offers, needs, or outbox files; verify peers before syncing.

What this means

Bad or misleading peer signals could persist in local memory and be reused later.

Why it was flagged

Peer-provided signals can be stored locally and promoted into curated memory. The docs describe manual curation, so this is purpose-aligned, but untrusted peer content could influence future agent decisions if promoted carelessly.

Skill content
signals.md       # Observations from the hive (incoming)
memory.md        # Collective knowledge (curated)
...
pluribus promote <signal>   # Move signal to memory.md
Recommendation

Review signal sources before promoting them to memory, and keep clear provenance/trust labels for peer-provided content.