Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Workflow Runner

v1.0.0

Automate end-to-end code implementation and testing with persistent coding and testing subagents, iterating until tests pass and committing results locally.

0· 125·4 current·4 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill claims an end-to-end implement+test loop with persistent subagents and local git commits; the included scripts implement a minimal proof-of-concept (artifact creation, test running, session store) but key behaviors are placeholders. Orchestrator only prints sessions_spawn payloads instead of calling platform APIs, and no script performs the advertised local git commit. Overall capability is consistent in intent but incomplete.
Instruction Scope
SKILL.md stays within the development-workflow scope (parse spec, spawn subagents, loop until tests pass, write results/). The scripts write artifacts and logs to results/ and /tmp, and store session metadata to a file. Instructions do not actively exfiltrate data to remote endpoints, but the orchestrator explicitly expects the main agent to call sessions_spawn/platform APIs (left as a manual connection point).
Install Mechanism
There is no remote install or download; this is an instruction-only skill with bundled scripts. No external URLs or installers are used.
!
Credentials
The skill declares no required env/config, but it persists session keys (session-store.js writes to skills/workflow-runner/session-store.json) which can contain sensitive session identifiers. Scripts also rely on system tools not documented in metadata (testing_worker.sh uses jq; scripts use tar, mkdir, chmod, etc.). The presence of stored 'sessionKey' values in the bundled session-store.json indicates the skill expects to handle session tokens — this should have been declared and justified.
Persistence & Privilege
The skill keeps persistent subagent session metadata (TTL, session keys) in a file under skills/workflow-runner. always:false (good). It does persist potentially sensitive session identifiers locally and retains subagent sessions by design (TTL configurable). It does not modify other skills' configs, but the local storage of session tokens increases blast radius if the host or workspace is shared.
What to consider before installing
This skill is a proof-of-concept that mostly does what it says, but there are gaps and some risky choices you should consider before installing: - Sensitive on-disk session data: session-store.js writes session metadata (including sessionKey-like strings) to skills/workflow-runner/session-store.json. Those session identifiers can be sensitive — treat the file as credentials and audit/remove any real session tokens before using the skill. - Undeclared runtime dependencies: testing_worker.sh uses jq and the scripts use tar and standard shell utilities. The skill metadata lists no required binaries; ensure jq/tar are available or update the scripts/metadata. If jq is not present, tests may fail in ways that could be confusing. - Placeholder behavior: orchestrator.js only prints payloads for sessions_spawn and does not perform real API calls; no script actually performs the advertised local git commit. If you expect full automation, you or a reviewer must implement the platform-specific calls and the commit step and re-audit them. - Local artifacts and permissions: the skill writes to results/ and /tmp; run it in a dedicated workspace and ensure file permissions are appropriate. - Best practices: run this skill only in an isolated/dev environment, inspect and sanitize session-store.json (remove hardcoded sessionKeys), add declared dependencies, and implement/inspect any code that will call platform session APIs before granting it access to live session credentials. If you are uncomfortable with persistent session tokens on disk, do not install or disable persistence and manual-manage sessions instead.

Like a lobster shell, security has layers — review code before you run it.

latestvk970qgqrv5y96hmf1c1fbsw96n8334p4

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments