Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Tesla Smart Charge
v1.1.1Schedules Tesla charging on specified dates with target battery % and times, managing charge limits during and after sessions for battery health.
⭐ 0· 1.1k·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The skill's stated purpose (schedule and manage Tesla charge limits) matches the included script and docs: it legitimately needs a Tesla account and the existing 'tesla' skill to operate. However registry metadata does not declare any required env vars or a Tesla dependency while SKILL.md and the script both require TESLA_EMAIL and a 'tesla' skill; this mismatch is an incoherence that could mislead users or automated installers.
Instruction Scope
SKILL.md instructs the agent to run cron jobs and to set TESLA_EMAIL in the environment, and the script reads a local schedule and writes plan/session JSON files in the skill 'memory' directory — those actions are within scope. However the SKILL.md asserts 'No shell injection risk' while the script actually invokes the other Tesla helper with subprocess.run using shell=True in start_charging (interpolating TESLA_EMAIL and paths). That is a concrete injection risk and contradicts the README/SKILL.md claim. The instructions also recommend embedding TESLA_EMAIL directly into cron task lines (exposing the email on the system command line), which is poor practice for sensitive credentials.
Install Mechanism
No install spec or third-party downloads are used — this is an instruction-only skill with source files included. That keeps disk/write risk limited to the packaged files. There are no external URLs or archive extraction steps in the bundle.
Credentials
The SKILL.md and script require TESLA_EMAIL and a configured 'tesla' skill (which will hold API credentials). The registry metadata, however, lists no required env vars or primary credential. This omission is misleading: users/installers may not realize they must provide TESLA_EMAIL and ensure the tesla skill has credentials. The skill itself does not request broad unrelated secrets, but the dependency on another skill for credentials introduces an implicit credential surface that is not declared.
Persistence & Privilege
The skill is not marked always:true and does not request elevated system privileges. It writes to its own memory/ files under the skills tree (charge plan and session state) which is expected for its purpose. The recommended cron usage runs the script on a schedule but that is user-controlled. There is no evidence it modifies other skills or system-wide agent settings.
What to consider before installing
What to consider before installing:
- Inconsistency: The package metadata does not declare TESLA_EMAIL or the 'tesla' skill dependency, but SKILL.md and the script require them. Expect to provide TESLA_EMAIL and to install/configure the separate 'tesla' skill with its API credentials before this will work.
- Injection risk: Despite claims of 'no shell injection risk', the script uses subprocess.run(..., shell=True) when starting charging, embedding variables into a shell string. This can be exploited if untrusted input ever reaches that string (TESLA_EMAIL or path). Ask the author to replace that call with a safe argument-list invocation (like other places in the script use) or patch locally before use.
- Credential handling: The docs suggest putting TESLA_EMAIL directly into cron task lines. Avoid placing credentials on command lines (they can be visible to other users/processes). Use secure environment storage (systemd service env files, cron's secure env support, or an agent-managed secret store) and ensure the 'tesla' skill stores tokens securely.
- Audit the dependent 'tesla' skill: This skill delegates all API interactions to scripts/tesla.py in a sibling 'tesla' skill. Inspect that script (and any stored tokens/config) before granting it access to your account — it performs the actual API calls and may hold or transmit sensitive tokens.
- Minor fixes to request: The author should update registry metadata to declare required env vars and dependencies, and correct the SKILL.md claim about injection safety. If you rely on this skill, run it in an isolated account/container and review logs initially.
If you want, I can: (1) point out the exact lines in the included script to patch (replace the shell=True call), (2) produce a safer, patched version of start_charging and the cron examples, or (3) scan the included 'tesla' skill (if you provide it) for credential handling behaviors.Like a lobster shell, security has layers — review code before you run it.
latestvk971yjy559a7ssz7eftas1vycd80zeb7
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
