Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
OpenClaw Healthcheck
v0.1.1This skill should be used when the user asks for an OpenClaw health check, OpenClaw security audit, server hardening review, exposure review, gateway safety...
⭐ 0· 709·3 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The script's actions (running `openclaw status`, lsof to inspect listeners, reading ~/.openclaw/openclaw.json, tailing /tmp/openclaw/... logs) are coherent with a local OpenClaw health/security check. However, the registry metadata declares no required binaries or config paths while the script clearly depends on system commands (openclaw, lsof, tail) and specific config/log paths. That metadata omission is an inconsistency that could lead to surprise or misuse.
Instruction Scope
SKILL.md instructs the agent to run the bundled Node script. The script reads user files (home config at ~/.openclaw/openclaw.json), inspects /tmp logs, and runs shell commands (lsof, tail, openclaw). Those actions are within the advertised scope, but they will expose potentially sensitive local content (config values, logs) into the script's JSON output (evidence). The SKILL.md does not explicitly enumerate these exact file reads/commands — the README and script do.
Install Mechanism
This is an instruction-only skill with bundled scripts; there is no network download/install step. No external packages or remote installers are fetched. Risk from installation is low, but the script will be executed locally with Node.js.
Credentials
The skill declares no required environment variables or config paths, yet it accesses the user's HOME, reads ~/.openclaw/openclaw.json, and inspects /tmp/openclaw logs. It also expects system utilities (openclaw binary, lsof, tail). Asking for no credentials is appropriate, but the metadata should declare the config/log paths and required binaries so users know what will be read and what commands must be present.
Persistence & Privilege
The skill does not request always-on presence and does not modify other skills or system-wide settings. It runs as a one-shot diagnostic and exits (the script uses process.exit). There is no evidence of persistent background behavior or network exfiltration.
What to consider before installing
This skill appears to implement a local OpenClaw health/security audit and does not contact external endpoints, but there are two practical concerns before you run it:
1) Metadata omissions: The package registry metadata does NOT list required binaries or config paths, but the script expects system commands (openclaw, lsof, tail) and reads ~/.openclaw/openclaw.json and /tmp/openclaw/<date>.log. Confirm those commands exist and be prepared for the script to read those files.
2) Sensitive local reads: The script collects command output and file contents into a JSON 'evidence' object that may contain config values or log lines (which can include secrets or PII). Review the script first and run it in a safe/test account or sandbox (or with a temporary HOME) before running on a production host.
Practical steps:
- Inspect scripts/healthcheck.mjs yourself (you already have it) to verify what will be read and output.
- Run the included tests in a sandboxed temp directory (npm test / node tests/test.mjs) to see behavior.
- Back up ~/.openclaw/openclaw.json and any logs, or run the script with HOME pointed at a safe test directory if you want to avoid exposing real configs.
- If you plan to install for repeated use, ask the maintainer to update metadata to declare required binaries (openclaw, lsof, tail) and config/log paths so the capability and the requested access are explicit.
Given these mismatches between metadata and actual behavior, treat the skill as suspicious until you confirm its runtime reads and outputs are acceptable for your environment.scripts/healthcheck.mjs:8
Shell command execution detected (child_process).
tests/test.mjs:30
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk97298jct6w3y1b8ja201c2ead82y5ag
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
