Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Skill Fix Workflow
v1.0.0Automatically extracts and stitches sequential skills into a configurable, exception-handled workflow saved as an automated program.
⭐ 0· 72·1 current·1 all-time
bysuperStupidBear@ugpoor
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name/description match the implementation: the code extracts assistant calls, recognizes parameters, stitches them into a Python program, and saves it under ./fixed_tasks. Requiring no credentials and no external binaries is proportionate to the stated purpose.
Instruction Scope
SKILL.md and the code instruct the agent to read the conversation, extract skill/tool calls, generate code, and write programs/logs to disk. That is within the described scope. However the generated programs include TODO placeholder functions that a user must implement; running generated programs as-is will likely fail or do nothing. The skill reads only the provided conversation content and does not access environment variables or other system state beyond writing files/directories.
Install Mechanism
No install spec (instruction-only) and the package includes source files only. No remote downloads or archive extraction. Risk from the install mechanism is low.
Credentials
The skill requests no environment variables, credentials, or special config paths. It operates on local paths it creates (./fixed_tasks, ./task_logs), which is consistent with generating and logging programs.
Persistence & Privilege
always:false and model invocation is allowed (the platform default). The skill writes generated programs and logs to the agent filesystem (./fixed_tasks, ./task_logs) — this is expected for its purpose but is a persistence behavior you should be aware of because it creates executable artifacts on disk.
What to consider before installing
This skill appears to do what it says (extract call sequences and write a stitched Python program), but review a few things before using it:
- The joiner writes code files to ./fixed_tasks and logs to ./task_logs. Expect files to be created on disk; check and clean these folders if you want to avoid persisted artifacts.
- The generated program contains placeholder functions (e.g., skill_fetch_data, tool_file_save). Running the program without implementing or importing real implementations will either fail or do nothing. Carefully implement and inspect those functions before running.
- I found an implementation inconsistency: generated code imports output_screen, output_file, output_api, output_web, but output_handler.py provides an OutputHandler class and helper functions (create_output_handler/get_output_function_code) rather than top-level output_* functions. That will likely cause runtime errors until corrected — it is not evidence of exfiltration but is a bug you should fix before running generated programs.
- The code does not request credentials or make network calls itself (API output is currently simulated). However, once you implement the placeholder functions or change output behavior, the generated program could perform network I/O. Audit any implementations you add for network endpoints, credentials, and data-sending logic.
Recommended actions:
1) Inspect the generated program (open ./fixed_tasks/<topic>.py) before execution.
2) Run generated code in an isolated environment (container or VM) until you confirm its behavior.
3) Implement placeholder functions with safe, audited code and add explicit checks for any network calls or credentials.
4) If you expect API output, verify the destination URL and authentication before enabling it.
Confidence note: I am confident this skill is not clearly malicious, but the implementation inconsistencies and ability to write executable files to disk justify caution; more information (author/source, tests showing corrected output functions) would raise confidence to high.Like a lobster shell, security has layers — review code before you run it.
latestvk977k0qgk7tdqyckw3sex2jhph83k7zg
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
