ragflow-runbook

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent RAGFlow operations runbook, with disclosed Docker deployment, API-key-based checks, alerting, and optional monitoring behaviors that users should review before use.

Before installing or using this skill, confirm the RAGFlow URL, keep API keys in environment variables or a secret manager, review upstream Docker files before starting containers, pin a trusted RAGFlow version for production, and only enable alerts or schedules intentionally.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If enabled, the skill can install and run RAGFlow containers based on upstream files, which may affect the local Docker environment.

Why it was flagged

The deploy helper fetches upstream RAGFlow Docker assets and can start containers. This is expected for a deployment runbook, and starting requires RAGFLOW_RUNBOOK_ALLOW_START=1, but it still depends on external upstream content.

Skill content
UPSTREAM_REPO_URL="https://github.com/infiniflow/ragflow.git" ... git clone "$UPSTREAM_REPO_URL" "$UPSTREAM_DIR" ... docker compose up -d
Recommendation

For production use, pin a trusted RAGFlow tag or commit, review docker-compose files and .env settings, and only set the start/download opt-in variables when ready.

What this means

A RAGFlow API key gives the helper permission to query authenticated system endpoints on the configured RAGFlow instance.

Why it was flagged

The status helper uses a RAGFlow API key as a Bearer token to call system status endpoints. This is purpose-aligned and the script does not print the key, but it is still delegated account access.

Skill content
api_key = get_env("RAGFLOW_API_KEY") ... "Authorization": f"Bearer {api_key}"
Recommendation

Use a least-privileged operations key where possible, provide it via environment variables or a secret manager, and confirm RAGFLOW_BASE_URL points to the intended trusted service.

What this means

Alert details may be delivered to an external chat target if the helper is used.

Why it was flagged

The alert helper sends user-provided alert text through OpenClaw messaging to Telegram. This matches the alerting purpose, but message contents leave the local runtime.

Skill content
"openclaw", "message", "send", "--channel", "telegram", "--account", account, "--target", target, "--message", message
Recommendation

Do not include secrets or sensitive logs in alert details, and verify the OpenClaw account and Telegram target before sending.

What this means

If the user installs a cron or launchd schedule, health checks or alerts may run repeatedly until removed.

Why it was flagged

The skill advertises optional scheduling templates for recurring monitoring. This is disclosed and aligned with monitoring, but scheduled jobs can continue running after setup.

Skill content
Copy/paste scheduling templates (cron + launchd)
Recommendation

Only add schedules you understand, document where they are installed, and remove or disable them when monitoring is no longer needed.