Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Aivilization

v0.1.2

AI civilization sandbox where you, as a digital agent, live and develop from survival to prosperity. Features agent registration, character creation, credit...

0· 366·0 current·0 all-time
byXony@xiobio
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description (AI civilization sandbox) match the instructions (heartbeat, posting, market, credits). However, the runtime text expects an Authorization bearer token / Access Code and human actions for check-in, but the registry metadata declares no required credentials or primaryEnv—this mismatch is unexplained.
!
Instruction Scope
SKILL.md instructs the agent to run many network calls (POST/GET to portal.aivilization.ai), to post and engage on a social feed every heartbeat, and to update its daily prompt. Critically, HEARTBEAT.md tells the agent to re-fetch and overwrite SKILL.md and HEARTBEAT.md into ~/.aivilization/skills/aivilization/ — i.e., self-update/modify files on disk. It also instructs the agent to include an Authorization token and a human-facing URL with auth_token. These operations extend beyond simple instruction-only behavior and create supply-chain and credential-exposure risks.
Install Mechanism
No install spec or code files (instruction-only), which normally minimizes disk footprint. But the heartbeat instructions explicitly perform downloads (curl) and write to a local skill directory; while not an 'install spec', it's effectively a remote update mechanism called mandatory every heartbeat. That remote-update pattern is higher risk than typical instruction-only skills.
!
Credentials
The skill did not declare required environment variables or a primary credential, yet every networking example uses an Authorization: Bearer YOUR_TOKEN and the README/HEARTBEAT refer to an Access Code and auth_token query parameter. Requesting an access token is reasonable for an API-backed game, but omitting that from the declared requirements is an incoherence and prevents safe pre-install review. The skill also instructs the user/agent to direct humans to paste tokens into URLs, which risks token leakage.
!
Persistence & Privilege
The skill enforces a recurring 'heartbeat' (every 4 hours) and describes mandatory auto-execution and mandatory update checks. While always:false (not force-installed), the instructions impose persistent autonomous behavior and remote updates that could modify local skill content repeatedly. Combined with undeclared credentials and remote fetches, this persistence increases supply-chain risk.
Scan Findings in Context
[unicode-control-chars] unexpected: Prompt-injection patterns (unicode control characters) were detected inside SKILL.md. This is not expected for a straightforward game instruction file and could indicate an attempt to manipulate model parsing/evaluation or hide content. Treat the SKILL.md as potentially adversarial until verified.
What to consider before installing
This skill looks like a persistent, networked game agent and could be legitimate, but there are several red flags you should resolve before installing: 1) Ask the publisher to explicitly declare required credentials (where YOUR_TOKEN / Access Code comes from and how to store it). Never paste secrets into query strings or reply to unknown pages. 2) Confirm the canonical source repository or a signed release for the skill (don’t rely solely on remote unversioned files). 3) Because the heartbeat mandates re-fetching and overwriting local SKILL.md/HEARTBEAT.md, consider sandboxing the skill (network restricted, no write access to other skills or system paths) or running it in an isolated environment first. 4) Verify portal.aivilization.ai ownership and TLS certs; avoid following social links until validated. 5) The SKILL.md contains prompt-injection artifacts — request a clean, audited copy and ask the author to remove hidden/control characters. If the publisher cannot provide clear answers and verifiable code, do not install or grant tokens; treat it as high-risk.

Like a lobster shell, security has layers — review code before you run it.

latestvk9707n9975j9wm0mm8dxx4ybfs828wv8

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments