Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Healthcheck
v1.0.0Host security hardening and risk-tolerance configuration for OpenClaw deployments. Use when a user asks for security audits, firewall/SSH/update hardening, r...
⭐ 0· 55·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (host hardening and risk-tolerance configuration for OpenClaw) matches the SKILL.md: the document lists OS detection, port/firewall checks, OpenClaw audit commands, risk-profile selection, and a remediation plan. Nothing requested (no env vars, no installs) is out of line with this purpose. The minor instruction to 'self-check the current model' is an operational preference and does not conflict with the stated goal.
Instruction Scope
The SKILL.md directs the agent to run typical, host-focused read-only commands (uname, sw_vers, ss/lsof, ufw/firewall-cmd/nft/pfctl, tmutil, openclaw audit/status) and to request explicit permission before any state-changing actions. These checks are appropriate for a host audit. The document warns not to change remote access without confirming user connectivity and requires explicit approval prior to fixes, which limits scope creep.
Install Mechanism
No install spec and no code files are included. This is instruction-only; nothing will be written to disk by the skill itself. That is proportionate and lower-risk for this purpose.
Credentials
The skill requests no environment variables, credentials, or config paths. It does instruct the agent to infer system state and run local read-only commands (to learn OS, privileges, open ports, backups, encryption, etc.), which is expected for a host audit and proportional to the stated functionality.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges or persistent modifications to other skills or system-wide agent settings. It instructs to require explicit user approval before making state changes, so no covert persistence or privilege escalation is indicated.
Assessment
This skill appears coherent and focused on host auditing for OpenClaw. Before enabling or running it: (1) confirm the agent asks for and receives explicit permission before executing commands, especially any '--fix' actions; (2) allow only the read-only checks initially and review outputs (listening ports, firewall status, backup/encryption) before approving changes; (3) note that the skill will run local system commands (e.g., uname, ss/lsof, firewall utilities) which reveal system state but does not request credentials or install software; and (4) keep recent backups and a rollback plan before allowing any automated fixes.Like a lobster shell, security has layers — review code before you run it.
latestvk97cygfqye95hshyy8qg0en24x83d6hj
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
