Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

linux-riscv-contribute

v1.0.0

Orchestrate an OpenClaw multi-agent pipeline to close Linux RISC-V gaps versus ARM/x86 (Linux tree + KVM lore), create and manage GitHub issues, generate des...

1· 207·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's stated purpose (discover -> issue -> plan -> implement -> patch) matches the instructions and included files. However, it promises to create/update GitHub issues and prepare/send patch emails while declaring no credentials, tokens, or config paths for GitHub/mailing delivery. That omission is an incoherence unless the platform supplies these credentials implicitly; the SKILL.md does not document that assumption.
!
Instruction Scope
Runtime instructions tell the agent to read large code trees (arch/riscv, arch/arm64, arch/x86, virt/kvm) and spawn ACP agent sessions (claude-code, codex) to perform design and implementation. This is expected for the purpose, but it explicitly instructs sending file-level designs and test artifacts to external ACP runtimes — which may transmit repository code and context to third‑party models. The skill does include three human gates and a strict 'no auto-send' rule for email, which reduces but does not eliminate the risk. The SKILL.md does not limit or describe what data is safe to send to ACP agents.
Install Mechanism
No install spec is present (instruction-only plus one bootstrap script). The provided bootstrap script only creates a workflow config and minimal state files under the user-supplied docs repo path and is straightforward and readable (no remote downloads or extraction).
!
Credentials
The skill declares no required environment variables or primary credential, yet its operations (GitHub issue creation, optionally sending emails, and calls to external ACP runtimes/models) normally require credentials or platform-level API access. The workflow-template.yaml embeds repo and mailing targets but provides no mechanism for authentication. This mismatch should be resolved or documented (e.g., 'OpenClaw will use agent-level secrets' or declare required env vars).
Persistence & Privilege
The skill is not always-enabled and does not request elevated system presence. Its bootstrap script writes files only under the user-provided docs_repo path and respects existing files (it skips existing workflow.yaml). It does not modify other skills or system-wide settings.
What to consider before installing
This skill appears to do what it says (automate a discover->issue->plan->implement->patch pipeline) but has a few important gaps and risks you should consider before installing: - Authentication: The skill will create/update GitHub issues and prepare/send patch emails, yet it declares no GitHub token or mail/send credentials. Confirm how the platform will supply authentication (agent secrets, user-provided tokens, or manual steps). Do not assume it will work without configuring credentials. - Data exposure: The workflow reads local Linux source trees and instructs spawning external ACP agents (claude-code, codex). That means potentially sensitive repository content and internal design details will be sent to external model runtimes. If your code or metadata must remain private, run this only in an environment where sending data to those models is permitted, or restrict the agent prompts to safe excerpts. - Human gates: The skill includes three explicit human approval gates and a 'never auto-send external email without user confirmation' rule; ensure the platform enforces these gates before you allow any autonomous runs. - Review templates and bootstrap script: The bootstrap script is simple and only writes under the docs repo you pass in, but verify the target path before running and keep backups. Also review workflow-template.yaml for hardcoded repo names/models (e.g., 'zcxGGmu/linux-riscv-docs', 'hanbbq/gpt-5.3-codex') and replace with your own configuration. - Test in dry-run/isolated environment first: Use the workflow's dry_run flags, run on a non-sensitive copy of repos, and confirm what data is transmitted to ACP agents and what the platform requires for GitHub/mailing authentication. If the project owner can clarify how credentials are provided (or update the skill to declare required env vars and data-sanitization rules), the remaining concerns would be addressed. Until then, treat the skill as functional but requiring careful ops/credential review.

Like a lobster shell, security has layers — review code before you run it.

latestvk979szmg4mqnre8kqcggw1s6xx82q3yr

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments