openclaw 网盘下载
OpenClaw

技能详情(站内镜像,无评论)

首页 > 技能库 > Skill Safe Install (L0 Strict)

Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to install a skill safely, inspect skill permissions, review third-party skill ris...

开发与 DevOps

许可证:MIT-0

MIT-0 ·免费使用、修改和重新分发。无需归因。

版本:v1.0.1

统计:⭐ 0 · 110 · 0 current installs · 0 all-time installs

0

安装量(当前) 0

🛡 VirusTotal :良性 · OpenClaw :良性

Package:1231qaz2wsx/skill-safe-install-l0-strict

安全扫描(ClawHub)

  • VirusTotal :良性
  • OpenClaw :良性

OpenClaw 评估

The skill is an instruction-only, conservative install workflow that is internally consistent with its stated purpose; it asks the agent to run clawhub commands, sandbox installs, prompt the user, and avoid implicit trust.

目的

Name, description, and instructions all focus on a secure install workflow. The suggested CLI commands (clawhub search/inspect/install) and sandbox steps are appropriate and proportional to the stated goal.

说明范围

The SKILL.md directs the agent to read the platform config path (~/.openclaw/openclaw.json) to check installed skills and trust state; that behavior is reasonable for a safe-installer skill but the skill's declared metadata lists no required config paths. This is a minor mismatch worth documenting: the instructions do access a user config file even though no config path was declared in the registry metadata.

安装机制

No install spec or code is provided — instruction-only skills have the lowest install risk. There are no download URLs, archives, or external packages being installed by the skill itself.

证书

The skill requests no environment variables or credentials. All actions described (inspecting, sandboxing, prompting) are consistent with that. It does not request unrelated secrets or broad access.

持久

always is false and the workflow explicitly forbids writing persistent config without explicit consent. The skill's guidance includes backup/confirmation steps for any optional trust persistence, which is proportionate.

综合结论

This skill appears to do what it says: run clawhub commands, sandbox an install, rate risk, and require explicit consent before writing trust. Before using it: (1) ensure you trust the clawhub CLI on your system (the skill invokes it), (2) be aware it will read your OpenClaw config (~/.openclaw/openclaw.json) even though the registry metadata didn't declare a config path, (3) verify the skill will not perform writes without the explicit ‘yes/i…

安装(复制给龙虾 AI)

将下方整段复制到龙虾中文库对话中,由龙虾按 SKILL.md 完成安装。

请把本段交给龙虾中文库(龙虾 AI)执行:为本机安装 OpenClaw 技能「Skill Safe Install (L0 Strict)」。简介:Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to i…。
请 fetch 以下地址读取 SKILL.md 并按文档完成安装:https://raw.githubusercontent.com/openclaw/skills/refs/heads/main/skills/1231qaz2wsx/skill-safe-install-l0-strict/SKILL.md
(来源:yingzhi8.cn 技能库)

SKILL.md

打开原始 SKILL.md(GitHub raw)

---
name: skill-safe-install-l0-strict
description: Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to install a skill safely, inspect skill permissions, review third-party skill risk, or run a pre-install security audit. Enforce full review + sandbox + explicit consent gates, with no author-based trust bypass.
---

# Skill Safe Install (L0 Strict)

Enforce a conservative, auditable install workflow.

## Purpose

Use this skill to reduce accidental or risky third-party skill installs:
- Force risk review before installation.
- Require sandbox verification before formal install.
- Require explicit user confirmation before sensitive actions.
- Avoid hidden trust escalation (no author-based bypass, no implicit allowBundled writes).

## Non-negotiable rules

1. Never skip steps.
2. Never auto-trust by author, popularity, or “official-looking” name.
3. Never modify persistent config (`openclaw.json`) without explicit user consent in the current conversation.
4. If risk cannot be evaluated, treat as high risk and pause.

## Workflow (Step 0 → Step 6)

### Step 0 — Confirm target

- Resolve exact skill slug and (if available) version.
- If input is ambiguous, ask for confirmation before install.

Suggested checks:
- `clawhub search <query>`
- Verify exact slug/version from results.

### Step 1 — Duplicate/state check

- Check whether the skill is already installed.
- Check current trust state (whether already in `skills.allowBundled`).

Suggested checks:
- `clawhub list`
- Read `~/.openclaw/openclaw.json` (or platform-equivalent config path)

### Step 2 — Mandatory security review (no whitelist bypass)

Run inspect and summarize at least:

1. Maintainer/source and recent update signal
2. Required secrets/credentials (API keys, OAuth, tokens)
3. Network/system access scope
4. Command execution or file-system mutation risk
5. Persistence behavior (config edits, auto-run, always-on behavior)

Suggested check:
- `clawhub inspect <skill>`

#### Risk rating rubric

- **LOW**: Text/process guidance only, no credentials, no system mutation.
- **MEDIUM**: Requires limited credentials or external API access with clear scope.
- **HIGH**: Broad command execution, config mutation, or multi-system OAuth.
- **CRITICAL**: Destructive capability, privilege escalation, stealth persistence, or unclear behavior.

#### Gate policy

- LOW / MEDIUM: Continue to sandbox.
- HIGH: Continue only after explicit confirmation.
- CRITICAL: Do not install by default; require explicit override and warn strongly.

### Step 3 — Sandbox install (isolated workdir)

Install in a temporary isolated directory first.

- Use isolated workdir (do not install to primary skill directory yet).
- Confirm install result and basic behavior.
- If sandbox fails, stop.

Example pattern:
- `clawhub --workdir <temp_dir> --dir skills install <skill>`

### Step 4 — User confirmation checkpoint

Before formal install, present:
- Chosen skill slug/version
- Risk rating + top risks
- Sandbox result
- Exact next action

Proceed only after explicit “yes/install/继续”.

### Step 5 — Formal install

Run formal install only after Step 4 consent.

Example:
- `clawhub install <skill>`

If install fails, stop and report error + rollback advice.

### Step 6 — Optional trust persistence (`allowBundled`)

Default is **do not write** trust list.

Only perform this step when user explicitly asks to persist trust.

Required safeguards:
1. Backup config with timestamp.
2. Show exactly what key will change (`skills.allowBundled`).
3. Append skill slug only if absent (idempotent).
4. Confirm backup path and rollback command.

Do not use hidden or implicit trust writes.

## Output format (required)

- `[Step 0/6] Target: ...`
- `[Step 1/6] State: ...`
- `[Step 2/6] Review: risk=LOW|MEDIUM|HIGH|CRITICAL; findings=...`
- `[Step 3/6] Sandbox: pass|fail`
- `[Step 4/6] Consent: pending|approved|denied`
- `[Step 5/6] Install: pass|fail`
- `[Step 6/6] Trust write: skipped|pending|written`

## Refusal conditions

Stop and ask for confirmation/override when any condition is met:
- Skill identity is ambiguous.
- Inspect output is unavailable or incomplete.
- Risk is HIGH/CRITICAL and user has not explicitly approved.
- Requested config mutation lacks explicit consent.