Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
rpm
v1.0.1Comprehensive RPM package management including creation, querying, verification, signing, dependency analysis, macro, and database management.
⭐ 0· 64·1 current·1 all-time
bywei dong@weidongkl
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description and SKILL.md are coherent: this is an RPM package-management guide (querying, building, signing, dependency analysis, DB management). However the skill metadata declares no required binaries or credentials while the runtime instructions assume many host tools (rpm, rpmbuild, mock, rpmdev-setuptree, spectool, rpmlint, gpg, etc.). That mismatch should be explained or corrected.
Instruction Scope
SKILL.md directly instructs running system-level rpm/rpmbuild/mock/rpm --addsign and other commands that read and modify packages, package DBs, and GPG keyrings. These actions are appropriate for an RPM management skill but are powerful: they access system package state and local key material and can install/remove or change system packages if executed.
Install Mechanism
No install spec (instruction-only). This is lower risk because nothing is downloaded or written by the skill itself. All runtime activity comes from running host tools per the README.
Credentials
The skill requests no environment variables or external credentials, which is proportional. It does reference local config files (~/.rpmmacros, /etc/rpmrc) and GPG key usage; access to local GPG private keys and the package database is sensitive and should be considered when granting the agent the ability to execute these commands.
Persistence & Privilege
always:false and no persistent installs — good. The skill is allowed autonomous invocation by default (platform default). Combined with the instruction set that runs privileged package and signing operations, autonomous invocation increases risk if the agent is permitted to execute system commands without user confirmation.
What to consider before installing
This skill is an instruction-only RPM management guide and appears to do what it says, but review these before installing:
- The SKILL.md expects many host tools (rpm, rpmbuild, mock, rpmdev-setuptree, spectool, rpmlint, gpg). The metadata does not declare these — confirm the runtime environment has them and consider updating the skill metadata.
- The commands operate on system package databases and GPG keyrings (e.g., rpm --addsign, rpm --rebuilddb). Allowing an agent to run them can modify or sign packages and access local private keys. Only enable the skill where you trust the agent and its environment (prefer a container/VM/test host).
- The skill requests no external credentials, which is good, but it can read local config files (~/.rpmmacros, /etc/rpmrc) and use $HOME; treat those as sensitive.
- If you plan to allow autonomous invocation, require user confirmation for destructive or privilege-escalating actions (install/remove/sign), or restrict the agent so it cannot execute arbitrary shell commands as root.
- Ask the publisher to declare required binaries and to provide a trusted homepage/source. The current owner ID is not human-readable; prefer skills from known maintainers.
Given the mismatch about required binaries and the potentially powerful local actions described, proceed cautiously — run in an isolated environment or require explicit user approval before executing package management or signing commands.Like a lobster shell, security has layers — review code before you run it.
build-systemvk976wc8p53dgeefr4rm70txz0183ehtjlatestvk976xz60t6bqt0t53b21cbmn3s83f6ywlinuxvk976xz60t6bqt0t53b21cbmn3s83f6ywpackagingvk976xz60t6bqt0t53b21cbmn3s83f6ywrpmvk976xz60t6bqt0t53b21cbmn3s83f6yw
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
