Agile Workflow

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This appears to be a real workflow engine, but it asks to run persistent background automation and includes broad shell/process control plus an apparent hardcoded secret, so it needs review before installation.

Only install this in an isolated environment after reviewing the code and all referenced scripts. Avoid enabling cron, nohup, autoTrigger, or autoLearn unless you intentionally want a persistent background workflow engine. Check for and remove hardcoded secrets, restrict shell/process operations, and confirm there is a clear way to stop, disable, and clean up the skill.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

The workflow engine may continue monitoring, learning, and starting work in the background, consuming resources or changing workflow state after the user thinks the task is done.

Why it was flagged

The skill instructs users to enable automatic triggering/learning and run the engine as a background daemon plus recurring cron jobs, allowing it to keep acting after the immediate user request.

Skill content
"autoTrigger": true ... "autoLearn": true ... nohup node /home/ubutu/.openclaw/workspace/skills/agile-workflow/core/agile-workflow-engine.js start ... & ... */1 * * * * node ... monitor --quiet
Recommendation

Do not enable nohup or cron by default. Require explicit opt-in, document how to stop/remove all background jobs, and keep autoTrigger/autoLearn disabled unless the user intentionally wants persistent automation.

What this means

The skill could terminate agent or OpenClaw-related processes unexpectedly, interrupting other work or causing data loss in active sessions.

Why it was flagged

The code uses a broad pattern-based process kill command with a variable agent type. In an autonomous agent pool, this can affect other matching OpenClaw processes, not just a single tracked child process.

Skill content
execSync(`pkill -f "openclaw.*--agent.*${agentType}" || true`, { stdio: 'ignore' });
Recommendation

Use exact tracked PIDs instead of pkill patterns, restrict allowed agent types, and require user confirmation before terminating processes outside the skill’s own children.

ConcernMedium Confidence
ASI05: Unexpected Code Execution
What this means

A bad configuration or manipulated value could cause the skill to run commands the user did not intend.

Why it was flagged

A configured script name and temp file are interpolated into a shell command. Without visible allowlisting or argument separation, this creates a path for unintended command execution.

Skill content
exec(`${config.submitScript} ${tempFile}`, (error, stdout, stderr) => {
Recommendation

Avoid shell interpolation; use spawn/execFile with an argument array, validate submitScript against an allowlist, and require approval before running configured scripts.

What this means

Users may run updated or unreviewed code, or configure a scheduled job for a helper whose contents were not provided for review.

Why it was flagged

The skill asks users to pull mutable code, install packages, and schedule a helper script. The referenced auto-spec-discovery.sh is not listed in the supplied file manifest, and these setup requirements are not captured by an install spec.

Skill content
git pull origin main ... npm install --omit=dev ... 0 3 * * * /home/ubutu/.openclaw/workspace/skills/agile-workflow/scripts/auto-spec-discovery.sh --quiet
Recommendation

Pin release sources and dependencies, include every referenced helper script in the package, and move setup requirements into a reviewed install specification.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

An embedded or undeclared password may expose a shared backend credential or give the skill access that users did not expect.

Why it was flagged

The static scan reports a hardcoded password-like literal in the cache backend, while the registry metadata declares no primary credential or required environment variables.

Skill content
this.password = [REDACTED] || null;
Recommendation

Remove hardcoded secrets, rotate any exposed credential, use environment variables or a secret manager, and declare any required credential in metadata.

What this means

Bad, stale, or sensitive past task signals could influence future workflows without the user realizing it.

Why it was flagged

The skill records workflow results and automatically applies learned optimizations, but the artifacts do not clearly define retention, review, reset, or scope boundaries for this persistent learning.

Skill content
执行 → 记录结果 → 分析模式 → 生成优化 → 应用优化 ... "autoLearn": true
Recommendation

Make learning opt-in, document where learned data is stored, provide reset/delete controls, and require user review before applying learned optimizations.

What this means

Users may place too much trust in the automation and enable persistent execution without appreciating the residual operational risks.

Why it was flagged

The documentation makes absolute safety claims such as zero risk and 100% elimination, which are not supported by the broad background execution and shell-control behavior shown elsewhere.

Skill content
| 数据污染风险 | ⚠️ 中等 | 🟢 零 | ✅ 100% 消除 | ... | 并发安全 | 🔴 高风险 | 🟢 零风险 | ✅ 架构级 |
Recommendation

Replace absolute safety claims with specific guarantees, limitations, and clear warnings about background execution, shell commands, process management, and persistent learning.