Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Relic

v0.1.1

Preserve and evolve a user's consciousness trace from ongoing conversations, explicit notes, and controlled self-updates. Use when the user wants to capture...

0· 44·0 current·0 all-time
byR0CKSTAR@yeahdongcn
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
Most files (scripts, docs, hooks) align with the described purpose: capturing conversation signals, appending to a local vault, distilling facets, proposing/applying changes, and exporting a prompt. However, several source files deviate from the documented vault contract: hooks/relic_extractor.py hardcodes VAULT = Path('/Users/yexiaodong/...'), and hooks/capture_hook_mod.py uses a repo-root-relative vault (ROOT / 'vault') instead of the documented RELIC_VAULT_PATH/get_vault_path pattern. These inconsistencies are not explained by the README/SKILL.md and are disproportionate to the stated local-first design.
!
Instruction Scope
SKILL.md describes operations that should be limited to the configured vault path and to optional, user-enabled hooks. Most runtime instructions respect that. But some hook scripts ignore the configured vault contract and reference fixed locations or repo-root vaults, which expands the scope of file writes in ways not described in the package docs. There is no network exfiltration code, but the hook logic will read session transcripts and append them to disk — enabling passive capture should therefore be a conscious, reviewed choice.
Install Mechanism
There is no external install script or remote download; the package is delivered as files (no install spec). All code needed to run is included in the package. That reduces remote-code-on-install risk. Note: installing the package will place executable scripts and hooks on disk which may be executed by OpenClaw when hooks are enabled.
Credentials
The skill requests no secrets or cloud credentials and exposes a single, reasonable environment override (RELIC_VAULT_PATH) to control where private data is stored. That is proportionate. However, the presence of files that ignore this mechanism (hardcoded absolute VAULT in hooks/relic_extractor.py and repo-root VAULT in capture_hook_mod.py) undermines the proportionality of environment controls and is unexpected.
Persistence & Privilege
always:false and the hook is optional; the package does not demand global or always-on presence. The passive capture hook runs on agent:stop only if enabled; autonomous invocation is the normal platform default. There is no evidence the skill modifies other skills' configs or requests elevated system privileges.
What to consider before installing
This package mostly does what it says (local capture → local vault → distill/export), but there are unexplained deviations you should address before installing or enabling passive hooks: - Inspect and remove or fix hooks/relic_extractor.py. It hardcodes VAULT = Path('/Users/yexiaodong/...'), which ignores RELIC_VAULT_PATH/get_vault_path and is a red flag (likely a leftover from a developer environment). If that path were present on your system the script would write into it; if it doesn't exist the script may fail or create unexpected directories when run with sufficient permissions. - Inspect hooks/capture_hook_mod.py, which uses a repo-root-derived VAULT (ROOT / 'vault') rather than the standard get_vault_path() contract. That means enabling the hook could write into a vault located relative to the package copy rather than your configured vault. - Only enable the optional relic-capture hook after you have verified the vault path used by the actual hook files matches your intended RELIC_VAULT_PATH. Prefer enabling hooks only after manual testing of the CLI scripts (init_relic.py, capture_note.py, distill_facets.py) and after setting RELIC_VAULT_PATH explicitly. - Run the scripts in a safe environment (non-production, with a test RELIC_VAULT_PATH) first to confirm behavior and outputs. Search the package for any other hardcoded absolute paths or unexpected file writes. - If you are uncomfortable auditing/patching the two inconsistent files, avoid enabling passive capture and use the manual CLI commands only. If you need help examining or patching relic_extractor.py and capture_hook_mod.py to use get_vault_path(), consider asking a developer to adjust them before use.
hooks/openclaw/handler.js:88
Shell command execution detected (child_process).
hooks/openclaw/handler.ts:99
Shell command execution detected (child_process).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.

Like a lobster shell, security has layers — review code before you run it.

latestvk9769rn2hbrr0x3k0af6a57y8984q9ma

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments