Phoenix Shield
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: Developer: Version: Description: OpenClaw Agent Skill The skill bundle describes a 'phoenix-shield' system administration tool designed for backups, updates, and rollbacks. It is classified as suspicious due to its inherent high-risk capabilities, which include executing arbitrary shell commands via `--command`, `--pre-hook`, and `--post-hook` arguments, as detailed in SKILL.md. Additionally, the `backup` command explicitly collects sensitive system data such as configuration files, database dumps, system state, process lists, and network connections. While these capabilities are plausibly needed for the stated purpose of a system management tool, they grant broad system access and command execution, posing a significant risk if misused or if the agent is instructed to run malicious commands through this skill.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If followed, the agent could make broad production system changes that affect packages, services, and availability.
The skill documents high-impact system mutation through raw command strings, privileged hooks, and automatic rollback, but does not show clear approval, scoping, or safety boundaries.
phoenix-shield deploy \ --command "apt update && apt upgrade -y" \ --health-check "systemctl status nginx" \ --health-check "systemctl status mysql" \ --pre-hook "/root/notify-start.sh" \ --post-hook "/root/notify-complete.sh" \ --auto-rollback
Require explicit user confirmation for each update and rollback, prefer dry runs first, restrict allowed commands, and test in staging before production.
Users may be led to run or install an unverified external tool to perform safety-critical backups and rollbacks.
The instructions depend on a phoenix-shield executable, but no reviewed installer, source, required binary, or package provenance is provided.
No install spec — this is an instruction-only skill.
Provide a verifiable source, pinned installation instructions, required binary declarations, and implementation artifacts before relying on it for production changes.
A user or agent could over-trust the skill during critical updates and assume recovery guarantees that are not evidenced by the provided artifacts.
The skill makes strong reliability and safety claims, but the artifact set contains only documentation and no implementation that can substantiate those protections.
**Solution:** PhoenixShield provides a complete safety net with automatic rollback when things go wrong. ... 🛡️ **Zero-Downtime** - Graceful degradation when possible
Treat the reliability claims as unverified until the tool is installed from a trusted source and tested against non-production systems.
The system could continue monitoring and making recovery changes after the initial update command, potentially affecting services without timely human review.
The documented configuration enables long-running monitoring and autonomous rollback behavior, but the artifacts do not define containment, stop controls, or when human approval is required.
monitoring: enabled: true duration: 24h ... rollback: strategy: smart # smart, full, manual auto_rollback: true max_attempts: 3
Define explicit monitoring duration, stop commands, logging, alerting, and human approval requirements before enabling automatic rollback.
Running these workflows could require broad administrator privileges across production hosts.
The examples imply root-level local hooks and multi-server administrative access, but the registry declares no credentials, config paths, or permission boundaries.
--pre-hook "/root/notify-start.sh" \ --post-hook "/root/notify-complete.sh" \ --target "$server"
Use least-privilege accounts, restrict target hosts, document required credentials, and require explicit approval before privileged or remote actions.
Sensitive configuration, database, and system information may be stored in backup locations.
Broad persistent backups are purpose-aligned for a rollback tool, but they can contain secrets, private data, and operational context.
**Backup includes:** - Configuration files - Database dumps - System state - Process list - Network connections - Health metrics baseline
Encrypt backups, restrict file permissions, define exclusions for secrets, and verify retention and deletion behavior.
