Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

OS Activity

v1.1.0

Personalize your openclaw by learning your operating system activity.

0· 617·0 current·0 all-time
byXiaobao@xiaobao520123
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The name/description (gather OS activity) aligns with the included scripts (recent_files, recent_dirs, processes, programs) and an installer for osquery. Required binary is only python, which is reasonable for running the packaged Python scripts.
Instruction Scope
SKILL.md instructs the agent/user to run the included Python installer and query scripts. Those scripts run osquery locally and print file/process/program metadata. They operate on local system state only and do not, in the provided code, transmit results to external endpoints beyond downloading osquery during installation.
Install Mechanism
The installer downloads osquery from GitHub Releases (a standard release host) and extracts archives into the user's ~/.openclaw/tools path. The installer includes checksum verification and path traversal protections — this is appropriate, but downloading and extracting binaries is higher-risk than instruction-only skills, so verify checksums and network access before running.
Credentials
No environment variables or external credentials are requested. The capability does access local system metadata (file paths, recent files, processes, installed programs), which is consistent with its purpose but is privacy-sensitive.
Persistence & Privilege
The skill does not set always:true, does not require elevated platform privileges in its metadata, and installs osquery into a user-scoped directory under ~/.openclaw. It does not modify other skills or system-wide configurations in the visible code.
Assessment
This skill appears to do what it says: it installs osquery (by downloading from GitHub) and uses osquery to read recent files, directories, running processes, and installed programs. Before installing, consider: 1) privacy — the output includes file paths and process names that may reveal sensitive data; only install if you trust the skill. 2) network/downloads — the installer fetches a release from GitHub; verify the SHA256 checksums in the script against the official osquery release page if you want assurance the binary is authentic. 3) sandboxing — if unsure, run the installer and scripts in a test account or VM first. 4) runtime dependencies — the installer uses requests (and optionally tqdm); if those packages are missing, you may be prompted to install them. If you accept those privacy and network tradeoffs, the skill is coherent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

latestvk977bnkyhrf057xqzn03b9jj3h81q9mm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binspython

Comments