Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Local-Passwords-Manager

v1.0.0

本地密码管理器,用于存储、查询、修改和删除账号密码。当用户要求记住密码、查询密码、修改密码、删除密码时使用。 存储文件:~/.openclaw/workspace/passwords.json 特性:密码加密存储、支持多账号、记录创建/修改时间、支持备注/URL、支持姓名、全字段搜索 触发词:记住xxx密码、查一...

0· 101·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name/description match the included code: a local password manager storing data under ~/.openclaw/workspace and using cryptography.Fernet. Requested dependencies (cryptography) are appropriate. However, the SKILL.md repeatedly instructs running 'python3 scripts/password_manager.py' while the repository contains 'password_manager.py' at the top level — a packaging/path mismatch that is unexpected and unnecessary for the stated purpose.
!
Instruction Scope
SKILL.md instructs the agent/user to run a script at scripts/password_manager.py, but the actual file is password_manager.py. The docs promise features (clipboard copy, CSV import/export) that are either not implemented as described or not verifiable from the provided code fragment. The code prints decrypted passwords to stdout — expected for a CLI but means any automated agent invoking this skill could expose plaintext to logs. SKILL.md and code also indicate the module will write both passwords.json and a .password_key file in the user's home — this is consistent but expands the agent's filesystem access surface (writes under ~/.openclaw).
Install Mechanism
No install spec; SKILL.md lists a single pip dependency (cryptography). This is proportionate and standard for local encryption. No remote downloads or obscure install URLs are used.
Credentials
The skill requests no environment variables or external service credentials. It only reads/writes files under the user's home (~/.openclaw/workspace). That file access is consistent with a local password manager.
Persistence & Privilege
The skill is not marked always:true and does not request elevated platform privileges. It writes its own files under ~/.openclaw/workspace, which is normal for local state. There is no evidence it tries to modify other skills or system-wide agent configs.
What to consider before installing
Key issues to consider before installing/using: - Path mismatch: SKILL.md commands reference scripts/password_manager.py but the included file is password_manager.py. Confirm the correct entrypoint before running. This mismatch could cause confusion or lead you to run an unintended script. - Likely runtime bugs: the source contains an apparent stray character and truncated code section (e.g., a stray 'i' in add_tag) which will cause Python syntax/runtime errors. The skill may not work as described until fixed. - Encryption fallback: if the cryptography package is missing, the code will store passwords in plaintext (it prints a warning). Make sure cryptography is installed and test that encryption/decryption works before trusting it with real secrets. - Data exposure: the CLI prints decrypted passwords to stdout. If an agent runs this skill autonomously, outputs may be logged or sent to other systems. Consider how outputs are handled and avoid automated exposure of plaintext secrets. - Local key handling: the symmetric key is stored in ~/.openclaw/workspace/.password_key with permissions set to 600 — this is expected for a simple local manager but store/backup policies are your responsibility. If an attacker can read that file they can decrypt all entries. Recommendations: 1) Do not import or store high-value secrets until the path mismatch and code errors are resolved. 2) Ask the publisher to fix the scripts path and any syntax/runtime bugs, and to implement/clarify clipboard/export behaviors. 3) Run the script in an isolated/test environment first, inspect the created files (~/.openclaw/workspace/passwords.json and .password_key), and verify that passwords are encrypted and decrypted correctly. 4) Review the full import/export implementation (CSV handling) to ensure it encrypts stored passwords on import. 5) If you need a production-grade password manager, prefer a well-audited, actively maintained solution.

Like a lobster shell, security has layers — review code before you run it.

latestvk971nw3zd2qagvz7psrawn3hws8331c0

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments