openclaw-backup-yyc

v1.0.0

OpenClaw 数据备份与恢复工具。⚠️ 触发条件:用户消息必须精确等于"备份openclaw数据"、"恢复openclaw数据"(中文)或"backup openclaw data"、"restore openclaw data"(英文),其中 openclaw 不区分大小写。其他任何输入(包括部分关键词如"...

0· 58·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description describe a backup/restore tool and the included scripts (backup.py, restore.py) implement those functions. The files accessed (~/.openclaw) and flows (create tar.gz, list/restore archives) match the stated purpose.
Instruction Scope
SKILL.md instructs running the included Python scripts and to ask for user confirmation before operations, which matches the scripts' behavior. The backup script also attempts to resolve the server's public IP by invoking curl against several external services to produce an scp example; this network lookup is a minor side-effect not documented in SKILL.md but is explainable (for showing SCP command).
Install Mechanism
No install spec — instruction-only with bundled scripts. Nothing is downloaded or written to disk by an installer. Risk surface is limited to the provided Python scripts being executed locally.
Credentials
No required environment variables or credentials are declared. The scripts optionally honor OPENCLAW_DIR if present (not listed in requires.env) and call out to external IP services via curl. No secrets (API keys, tokens, passwords) are requested. The optional use of OPENCLAW_DIR should be noted but is proportionate to locating the data directory.
Persistence & Privilege
always is false and the skill does not request persistent or cross-skill configuration. It does not modify other skills or system-wide settings. Autonomous invocation is the platform default and not a special privilege here.
Assessment
This skill appears to be a straightforward local backup/restore tool. Before installing/running it: 1) review the two bundled scripts (backup.py, restore.py) yourself — they will run locally and operate on ~/.openclaw or the directory in OPENCLAW_DIR if set; 2) ensure you have Python and (optionally) curl on the host if you want the public-IP scp example to work; 3) note the backup script queries external IP services to display an scp command (no data from your system is sent other than the IP lookup), and no credentials are requested or exfiltrated; 4) the tool advises you to download backups off the server—follow that advice if backing up remote hosts; 5) if you do not trust the source, do not run the scripts with elevated privileges (avoid running as root).

Like a lobster shell, security has layers — review code before you run it.

latestvk978fbdgkfzkp1rw53ej8qg5en848p93

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments