Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Agent Security Ops
v1.2.2Stop leaking secrets. Pre-commit hooks + 10-point scans + cron monitoring. Agent-ops security in one command. By The Agent Wire (theagentwire.ai)
⭐ 2· 702·3 current·3 all-time
byThe Agent Wire@theagentwire
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the implementation: scripts set up pre-commit hooks, run multiple scans, harden .gitignore, and provide a monitor. No unrelated credentials or opaque external services are requested.
Instruction Scope
The runtime instructions and scripts scan both the repository and user home areas (shell profiles, $HOME Desktop/Downloads, ~/.ssh) and create repository state under .security-ops. They also install a fail-closed pre-commit hook that will block commits if TruffleHog is missing or finds secrets. These are reasonable for an 'agent-ops' security tool, but they go beyond repo-only scanning and will touch user files and repo hooks.
Install Mechanism
There is no platform install spec in the registry (instruction-only), but setup.sh downloads a TruffleHog tarball from the project's GitHub releases and verifies a SHA256 checksum from the same release. Checksum verification is implemented (good), but network download and extraction remain higher-risk than using a vetted package manager; this is nonetheless proportionate to the stated purpose.
Credentials
The skill declares no required env vars; only an optional TRUFFLEHOG_VERSION override is supported. The scripts read $HOME and may inspect shell profiles and other user files (intended for environment secret detection) — this access is consistent with the tool's purpose but worth noting to users.
Persistence & Privilege
The skill is not always:true. It writes a pre-commit hook to the repository, appends to/edits .gitignore, creates .security-ops state inside the repo, installs a trufflehog binary to $HOME/.local/bin, and (with --fix-ssh) can change permissions in ~/.ssh. Those modifications are in-scope for a repo hardening tool but are persistent and can be disruptive (blocked commits, changed SSH file permissions).
Assessment
This skill appears coherent and implements a useful local secret-scanning workflow, but review these points before installing:
- Backup: back up existing .git/hooks/pre-commit and .gitignore before running setup.sh (the script appends/overwrites hooks and may add patterns).
- Downloads: setup.sh downloads a TruffleHog tarball from GitHub and verifies a checksum from the same release; this is standard but still performs network I/O and writes a binary to $HOME/.local/bin—inspect the script and confirm the download URL if you have stricter policies.
- Scope: scan.sh inspects files outside the repo (shell profiles, $HOME Desktop/Downloads, ~/.ssh) for environment secrets. This is by design for environment auditing, but if you only want repo-scanning, run scan.sh against the repo and avoid global checks.
- Hooks behavior: the pre-commit hook is fail-closed and will block commits if TruffleHog is missing or finds results; you can bypass with git commit --no-verify, but that defeats the protection. Expect some operational friction.
- SSH changes: run setup.sh --fix-ssh only if you understand it will modify permissions under ~/.ssh (chmod 700/600).
- Cron/monitoring: monitor.sh writes .security-ops state files in the repo and exits non-zero when findings change; integrate it into cron carefully and ensure the notify action you call is safe.
If you want maximum assurance, inspect the provided scripts locally (they are plain shell), run them in a test repository or VM first, and confirm network downloads and checksum logic meet your requirements.Like a lobster shell, security has layers — review code before you run it.
latestvk973rs3ck2pwkk54w8za2rpyj582eyrx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🔒 Clawdis
