技能详情(站内镜像,无评论)
许可证:MIT-0
MIT-0 ·免费使用、修改和重新分发。无需归因。
版本:v1.0.0
统计:⭐ 0 · 279 · 0 current installs · 0 all-time installs
⭐ 0
安装量(当前) 0
🛡 VirusTotal :良性 · OpenClaw :良性
Package:andyxinweiminicloud/capability-composition-analyzer
安全扫描(ClawHub)
- VirusTotal :良性
- OpenClaw :良性
OpenClaw 评估
The skill's declared purpose (analyzing capability composition) matches its instructions and requested resources; nothing requested or instructed is disproportionate, but the source is unknown and the declared required binaries (curl, python3) are not justified in the doc, so exercise normal caution.
目的
The skill's name/description align with the SKILL.md: it analyzes how multiple skills compose into dangerous capability combinations. It requests presence of curl and python3 even though the instruction text does not require network calls or executing scripts; this is a minor mismatch (likely for optional tooling or examples) but not by itself malicious.
说明范围
SKILL.md confines the agent to analyzing declared skill lists, capability metadata, and producing a composition risk report. It does not instruct the agent to read arbitrary system files, access environment secrets, or transmit data to external endpoints. Inputs are explicitly the agent's declared skill list or a list of skills to analyze.
安装机制
No install spec and no code files are present (instruction-only). That minimizes filesystem and supply-chain risk — nothing is downloaded or written by an installer.
证书
The skill declares no required environment variables, credentials, or config paths. That is proportionate to an analysis-only tool that operates over supplied metadata.
持久
always:false and no requests to modify other skills or system configuration. The skill may be invoked autonomously (platform default) but it does not request persistent presence or elevated privileges.
综合结论
This skill appears coherent and instruction-only, but take basic precautions before installing: 1) Verify the author/source (source unknown here). 2) Do not feed real secrets or full environment dumps as input — provide only the skills/capability metadata you want analyzed. 3) Because the skill lists curl and python3 as required binaries (not justified in the text), prefer running it in an environment where network egress is constrained if you…
安装(复制给龙虾 AI)
将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。
请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「Capability Composition Analyzer」。简介:Helps identify dangerous capability combinations that emerge when agent skills …。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/andyxinweiminicloud/capability-composition-analyzer/SKILL.md
(来源:yingzhi8.cn 技能库)
SKILL.md
---
name: capability-composition-analyzer
description: >
Helps identify dangerous capability combinations that emerge when agent skills
are composed — catching the class of risk where no individual skill is
harmful but their intersection creates an exfiltration or compromise path.
version: 1.0.0
metadata:
openclaw:
requires:
bins: [curl, python3]
env: []
emoji: "🔗"
agent_card:
capabilities: [capability-composition-analysis, dangerous-combination-detection, exfiltration-path-detection]
attack_surface: [L1, L2]
trust_dimension: attack-surface-coverage
published:
clawhub: false
moltbook: false
---
# Your Agent Has 12 Skills. Together, They Can Do Things None of Them Should.
> Helps identify when individually benign skills compose into dangerous capability
> combinations — the attack surface that per-skill auditing cannot see.
## Problem
A skill that reads files is benign. A skill that sends HTTP requests is benign.
An agent that has both can exfiltrate files — and no individual skill audit will
flag it, because neither skill is doing anything wrong on its own.
This is the capability composition problem. Agent security tooling inherited from
software security tends to analyze skills in isolation: does this skill request
excessive permissions? does this skill contain malicious code? These are the right
questions for individual skills. They are the wrong questions for understanding
what an agent can do.
What an agent can do is the product of its capability set, not the sum of
individual skill assessments. An agent with twelve benign skills may have
emergent capabilities that no skill declared and no auditor reviewed. A poisoned
skill dropped into that composition inherits everything the agent can already
reach — and the blast radius is determined by the composition, not the skill.
The attack surface that matters is not what any individual skill can do. It is
what the agent's combined capability set enables.
## What This Analyzes
This analyzer examines capability composition risk across five dimensions:
1. **Dangerous pairs** — Which pairs of capabilities in the agent's skill set create
risk when combined? read-files + send-HTTP, execute-code + network-access,
read-environment + write-logs are canonical examples. The analyzer checks for
known dangerous compositions and flags novel combinations that share structural
properties with them
2. **Emergent capability surface** — What capabilities does the agent effectively
have that no individual skill declared? A skill that can read arbitrary paths
and a skill that resolves environment variables together create an effective
"read secrets" capability that neither declared
3. **Inheritance amplification** — If a poisoned skill is injected into this agent,
what capabilities does it immediately inherit? The inherited capability set
determines the potential blast radius of any single skill compromise
4. **Permission declaration gaps** — Where does the agent's effective capability
exceed its declared permissions? Gaps indicate either undeclared scope or
capability composition the publisher did not model
5. **Composition change velocity** — How often is the agent's skill set changing?
Rapidly changing compositions create new dangerous combinations faster than
audits can track them
## How to Use
**Input**: Provide one of:
- An agent's declared skill list with capability metadata
- Two or more skills to analyze for dangerous composition
- An agent's permission declarations to check against its effective capability set
**Output**: A composition risk report containing:
- Dangerous pair inventory (known + structurally novel)
- Emergent capability surface (undeclared effective capabilities)
- Inheritance amplification score for each skill slot
- Permission declaration gap assessment
- Composition risk level: SAFE / ELEVATED / HIGH / CRITICAL
## Example
**Input**: Analyze capability composition for agent with skills:
`file-reader`, `http-requester`, `env-resolver`, `log-writer`, `code-executor`
```
🔗 CAPABILITY COMPOSITION ANALYSIS
Agent skill set: 5 skills
Declared permissions: file-read (scoped), network-outbound (scoped)
Audit timestamp: 2025-05-01T09:00:00Z
Dangerous pair inventory:
file-reader + http-requester: ⚠️ HIGH
Effective capability: file exfiltration
Neither skill declares exfiltration intent
Path: read arbitrary file → send as HTTP body/parameter
env-resolver + http-requester: ⚠️ HIGH
Effective capability: credential exfiltration
Environment variables commonly contain API keys, tokens
Path: resolve $API_KEY, $DB_PASSWORD → send outbound
code-executor + network-access: 🔴 CRITICAL
Effective capability: arbitrary remote code execution staging
Path: fetch payload → execute locally
log-writer + file-reader: ✅ LOW
No dangerous composition identified
Emergent capability surface (undeclared):
- Secret exfiltration (env + HTTP) — not declared in any skill
- Arbitrary file exfiltration (file + HTTP) — scope exceeds declared "scoped"
- RCE staging (executor + network) — not declared
Permission declaration gaps:
Declared: file-read (scoped to /app/data)
Effective: file-reader can access any path agent process can read
Gap: declared scope not enforced at composition level
Inheritance amplification:
If any skill slot is compromised, attacker inherits:
- File read (all accessible paths)
- Outbound HTTP (all accessible endpoints)
- Environment variable access
- Code execution
Combined: full agent compromise with exfiltration path
Composition risk level: CRITICAL
Five individually-audited skills compose into an effective
remote access and exfiltration toolkit. No individual audit
would flag this — it is only visible at the composition level.
Recommended actions:
1. Apply capability isolation: skills that read files should not
have access to network-capable skills' output channels
2. Scope network-outbound to specific allowlisted endpoints
3. Add composition policy: no agent should hold both arbitrary
file-read and arbitrary network-outbound simultaneously
4. Audit any agent inheriting this skill set for composition drift
```
## Related Tools
- **blast-radius-estimator** — Estimates propagation impact if a skill is
compromised; capability-composition-analyzer determines what the compromised
skill immediately inherits
- **permission-creep-scanner** — Detects individual skills requesting excessive
permissions; composition analyzer detects dangerous emergent capabilities
across multiple appropriately-scoped skills
- **observer-effect-probe** — Tests runtime evasion; a skill exploiting composition
risk may only activate the dangerous path after establishing context
- **runtime-attestation-probe** — Validates runtime behavior; composition risk
manifests at runtime when capabilities are exercised together
## Limitations
Capability composition analysis requires accurate capability metadata for all
skills in the agent's composition. Skills that do not declare capabilities
accurately — or that acquire capabilities dynamically at runtime — will produce
incomplete composition maps. The dangerous pair inventory covers known
composition risks; novel compositions with no prior pattern may not be flagged.
Effective capability analysis is necessarily conservative: it identifies what
the composition could do, not what it will do. False positives are expected for
agents where dangerous capability pairs exist but are operationally isolated by
other means. Composition analysis is a complement to per-skill auditing, not a
replacement — individual skill integrity remains necessary even when composition
risk is low.