Tripwire
v1.0.0Tripwire host-based IDS reference. Cryptographic key setup, database initialization, integrity checks, policy rules with severity levels, twcfg.txt configura...
⭐ 0· 77·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description describe Tripwire (host-based IDS) and all required files and instructions relate to installing, initializing, checking, and configuring Tripwire. There are no unrelated environment variables, binaries, or external services requested.
Instruction Scope
SKILL.md and scripts/script.sh are purely documentation-style instructions that tell the operator to run Tripwire/twadmin commands, manage key files under /etc/tripwire, and scan system paths (e.g., /bin, /etc). That is expected for a Tripwire reference, but these operations require root and will read many system files — the skill's guidance can cause extensive system scanning and produce reports. No instructions attempt to exfiltrate data to unexpected endpoints; example cron/email uses a placeholder admin@example.com.
Install Mechanism
There is no install spec and the skill is instruction-only except for an included documentation script. Nothing is downloaded or written to disk by an installer, so install risk is low.
Credentials
The skill declares no required environment variables or credentials. SKILL.md references Tripwire key files and passphrases under /etc/tripwire, which is appropriate and expected for Tripwire operations; no unrelated secrets or credentials are requested.
Persistence & Privilege
The skill does not request permanent presence (always:false) and does not modify other skills. However, the documented commands require root privileges to manage Tripwire keys, database and to scan system files — the user should be aware of the privilege requirements before running commands shown in the documentation.
Assessment
This skill is a reference and helper for Tripwire — not a network exfiltration tool. Before using it: (1) realize the documented commands operate on system files and require root; they will scan many paths and can modify Tripwire keys/database, so run on intended hosts only; (2) protect Tripwire passphrases/site-local keys — the docs show removing plain-text policy/config files after signing; (3) change placeholder email addresses (admin@example.com) before enabling automated reports; and (4) because this is documentation, no code is installed by the skill itself — review and run the shown commands manually rather than blindly executing scripts as root.Like a lobster shell, security has layers — review code before you run it.
latestvk9763kr8a901njbdgeb3xpdkms83g4rk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
