linux-riscv-contribute

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is a coherent, human-gated kernel-contribution workflow, but it can modify a local Linux tree, use worker agents, and create public GitHub issues if the user approves.

Before installing, confirm that the configured GitHub repository and assignee are yours or intended, run the workflow in a clean Linux worktree, keep the human gates in place, and verify what data your ACP agents may receive or retain.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An approved run may change the local Linux working tree and consume compute by building or testing kernel code.

Why it was flagged

The skill directs worker agents to modify code and run build/test loops. This is central to the kernel-contribution purpose and bounded by plan approval and iteration limits, but it is still high-impact local development authority.

Skill content
Run iterative loop until pass or policy limit:
1. Implement approved plan.
2. Build and run configured tests.
3. Parse failures and patch.
Recommendation

Run it in a clean branch, disposable worktree, or container; review workflow.yaml limits; and inspect diffs before approving patches.

What this means

The workflow may create or modify visible GitHub issues using the user's configured GitHub identity.

Why it was flagged

Creating or updating GitHub issues requires delegated account or repository authority. The action is disclosed and gated by human triage, but users should verify the target repository and credential scope.

Skill content
For each approved gap:
- Create/update issue in configured repo.
- Add labels from severity/type.
Recommendation

Confirm the configured repository before Step 2, use the least-privileged GitHub token or account available, and review the approved gap list before syncing issues.

What this means

Repository context, gap evidence, plans, or patches may be shared with configured worker agents/providers.

Why it was flagged

The workflow sends planning and implementation tasks to ACP worker agents. This is explicitly part of the design, but the artifacts do not describe the data boundary, provider retention, or isolation properties of those agents.

Skill content
Spawn ACP session explicitly:
- `runtime: "acp"`
- `agentId: "claude-code"`
...
Spawn ACP session explicitly:
- `runtime: "acp"`
- `agentId: "codex"`
Recommendation

Use only trusted ACP agents and provider configurations, and avoid running this on private code or sensitive patches unless those data-sharing terms are acceptable.

What this means

Project context and prior agent outputs may remain on disk and be reused in future workflow steps.

Why it was flagged

The skill intentionally persists workflow state, logs, gap registries, issue mappings, plans, and patch artifacts. This supports auditability, but stale or incorrect state could influence later runs.

Skill content
Record each iteration in `state/run_history/*.json`.
Recommendation

Review and clean the kernel/openclaw state directory when switching projects or after failed runs, and do not treat stored agent output as authoritative without review.