Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
skill-cross-agent-v1.0.0.tar
v1.0.0跨机器Agent协作 - 通过SSH连接局域网内其他OpenClaw实例,实现多机任务分发
⭐ 0· 307·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name, description and declared required binaries (sshpass, ssh, scp, ping, nc) align with the implemented features (scan, test, send, get, put, exec). The scripts implement exactly the advertised SSH-based cross-agent behavior.
Instruction Scope
Runtime instructions and scripts perform network scanning, arbitrary remote command execution, file transfer, and prompt to install system packages via sudo. The wizard will auto-install sshpass (sudo apt) and the scripts disable SSH host-key checking (StrictHostKeyChecking=no) which increases MITM risk. The skill also writes plaintext credentials to a local config file and exposes passwords on the command line via sshpass—these are beyond a minimal, safe instruction scope.
Install Mechanism
No remote downloads or archive extraction; an included install.sh copies files into the user's ~/.openclaw/skills and suggests installing dependencies via the system package manager. Installing dependencies requires sudo (prompted to user).
Credentials
The skill requests no environment variables but reads/writes ~/.config/openclaw/cross-agent.conf (not declared in metadata) and stores default_pass in plaintext. It relies on sshpass (which exposes passwords to process listings) and therefore requires sensitive credentials but does not declare or warn about the config path in the metadata—disproportionate to the claimed 'no required config' metadata.
Persistence & Privilege
The skill does not request always:true and does not modify other skills. It persists a user-scoped config file and suggests aliases/.bashrc entries but does not auto-enable system-wide privileges. The wizard/install may run sudo to install packages if the user agrees.
What to consider before installing
This skill behaves like an SSH-based remote control tool and is coherent with the description, but it has multiple risky practices you should consider before installing:
- Credentials: The skill stores default_pass in plaintext under ~/.config/openclaw/cross-agent.conf (it appends values). Avoid saving passwords; prefer SSH key authentication instead.
- sshpass and process exposure: The scripts use sshpass and pass passwords on the command line, which can be visible to local users via process listings—only use in trusted, isolated environments.
- Host key checking disabled: All SSH calls set StrictHostKeyChecking=no and UserKnownHostsFile=/dev/null, disabling host-key verification and increasing MITM risk on untrusted networks.
- Network scanning and remote exec: The skill scans subnets and can run arbitrary commands on remote machines; this can be intrusive and should only be used on networks and hosts you control and trust.
- Silent metadata mismatch: Metadata declares no required config paths, but the skill reads/writes ~/.config/openclaw/cross-agent.conf—this is an incoherence to be aware of.
- Installer prompts for sudo: The wizard/install may run apt install under sudo to add dependencies—review before consenting.
Actions you can take:
- Inspect the included scripts locally before running; consider removing or altering insecure behaviors (remove sshpass usage, enable host-key checking, stop storing plaintext passwords).
- Use SSH key-based auth and remove config storage of passwords; if you must store secrets, use a secure credential store (not plain files).
- Run initial tests in an isolated network or VM.
- If you need stronger assurance, ask the publisher for provenance (source repo, signed releases) or request a version that uses key-based auth and does not disable host-key verification.
Given the combination of insecure credential handling and the mismatch between metadata and file behavior, proceed only if you accept these risks and have verified the code.Like a lobster shell, security has layers — review code before you run it.
latestvk97bzgxw7xd0z2xfb70azrdnzx829pb8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
