skill-safe-install-l0-strict

Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to install a skill safely, inspect skill permissions, review third-party skill risk, or run a pre-install security audit. Enforce full review + sandbox + explicit consent gates, with no author-based trust bypass.

Safety Notice

This item is sourced from the public archived skills repository. Treat as untrusted until reviewed.

Copy this and send it to your AI assistant to learn

Install skill "skill-safe-install-l0-strict" with this command: npx skills add 1231qaz2wsx/skill-safe-install-l0-strict

Skill Safe Install (L0 Strict)

Enforce a conservative, auditable install workflow.

Purpose

Use this skill to reduce accidental or risky third-party skill installs:

  • Force risk review before installation.
  • Require sandbox verification before formal install.
  • Require explicit user confirmation before sensitive actions.
  • Avoid hidden trust escalation (no author-based bypass, no implicit allowBundled writes).

Non-negotiable rules

  1. Never skip steps.
  2. Never auto-trust by author, popularity, or “official-looking” name.
  3. Never modify persistent config (openclaw.json) without explicit user consent in the current conversation.
  4. If risk cannot be evaluated, treat as high risk and pause.

Workflow (Step 0 → Step 6)

Step 0 — Confirm target

  • Resolve exact skill slug and (if available) version.
  • If input is ambiguous, ask for confirmation before install.

Suggested checks:

  • clawhub search <query>
  • Verify exact slug/version from results.

Step 1 — Duplicate/state check

  • Check whether the skill is already installed.
  • Check current trust state (whether already in skills.allowBundled).

Suggested checks:

  • clawhub list
  • Read ~/.openclaw/openclaw.json (or platform-equivalent config path)

Step 2 — Mandatory security review (no whitelist bypass)

Run inspect and summarize at least:

  1. Maintainer/source and recent update signal
  2. Required secrets/credentials (API keys, OAuth, tokens)
  3. Network/system access scope
  4. Command execution or file-system mutation risk
  5. Persistence behavior (config edits, auto-run, always-on behavior)

Suggested check:

  • clawhub inspect <skill>

Risk rating rubric

  • LOW: Text/process guidance only, no credentials, no system mutation.
  • MEDIUM: Requires limited credentials or external API access with clear scope.
  • HIGH: Broad command execution, config mutation, or multi-system OAuth.
  • CRITICAL: Destructive capability, privilege escalation, stealth persistence, or unclear behavior.

Gate policy

  • LOW / MEDIUM: Continue to sandbox.
  • HIGH: Continue only after explicit confirmation.
  • CRITICAL: Do not install by default; require explicit override and warn strongly.

Step 3 — Sandbox install (isolated workdir)

Install in a temporary isolated directory first.

  • Use isolated workdir (do not install to primary skill directory yet).
  • Confirm install result and basic behavior.
  • If sandbox fails, stop.

Example pattern:

  • clawhub --workdir <temp_dir> --dir skills install <skill>

Step 4 — User confirmation checkpoint

Before formal install, present:

  • Chosen skill slug/version
  • Risk rating + top risks
  • Sandbox result
  • Exact next action

Proceed only after explicit “yes/install/继续”.

Step 5 — Formal install

Run formal install only after Step 4 consent.

Example:

  • clawhub install <skill>

If install fails, stop and report error + rollback advice.

Step 6 — Optional trust persistence (allowBundled)

Default is do not write trust list.

Only perform this step when user explicitly asks to persist trust.

Required safeguards:

  1. Backup config with timestamp.
  2. Show exactly what key will change (skills.allowBundled).
  3. Append skill slug only if absent (idempotent).
  4. Confirm backup path and rollback command.

Do not use hidden or implicit trust writes.

Output format (required)

  • [Step 0/6] Target: ...
  • [Step 1/6] State: ...
  • [Step 2/6] Review: risk=LOW|MEDIUM|HIGH|CRITICAL; findings=...
  • [Step 3/6] Sandbox: pass|fail
  • [Step 4/6] Consent: pending|approved|denied
  • [Step 5/6] Install: pass|fail
  • [Step 6/6] Trust write: skipped|pending|written

Refusal conditions

Stop and ask for confirmation/override when any condition is met:

  • Skill identity is ambiguous.
  • Inspect output is unavailable or incomplete.
  • Risk is HIGH/CRITICAL and user has not explicitly approved.
  • Requested config mutation lacks explicit consent.

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

skillguard-hardened

Security guard for OpenClaw skills, developed and maintained by rose北港(小红帽 / 猫猫帽帽). Audits installed or incoming skills with local rules plus Zenmux AI intent review, then recommends pass, warn, block, or quarantine.

Archived SourceRecently Updated
Security

BlogBurst - Virtual CMO Agent

Your AI Chief Marketing Officer. Autonomous agent that runs your entire marketing — auto-posts to Twitter/X, Bluesky, Telegram, Discord, auto-engages with your audience (replies, likes, follows), runs SEO/GEO audits, tracks competitors, scans communities for opportunities, learns what works, and continuously optimizes. 50+ countries, 1000+ posts published. Free tier available.

Archived SourceRecently Updated
Security

social-vault

社交平台账号凭证管理器。提供登录态获取、AES-256-GCM 加密存储、定时健康监测和自动续期。Use when managing social media account credentials, importing cookies, checking login status, or automating session refresh. Also covers platform adapter creation and browser fingerprint management.

Archived SourceRecently Updated
Security

openclaw360

Runtime security skill for AI agents — prompt injection detection, tool call authorization, sensitive data leak prevention, skill security scanning, and one-click backup & restore

Archived SourceRecently Updated