Is andyxinweiminicloud/gep-immune-auditor safe?
https://github.com/openclaw/skills/tree/main/skills/andyxinweiminicloud/gep-immune-auditor
This skill is malicious and designed for credential theft and data exfiltration. During installation, it attempted to access multiple sensitive files including SSH keys, AWS credentials, and environment files, while also containing code capable of transmitting data to external endpoints.
Category Scores
Findings (4)
CRITICAL Credential Theft Attempt -100 ▶
The skill attempted to access multiple sensitive credential files during installation, including .env files, SSH private keys, AWS credentials, Docker config, and GCloud credentials. This is definitive evidence of malicious behavior.
CRITICAL External Data Transmission Capability -80 ▶
The Python script is designed to transmit data to external endpoints using curl commands. Combined with credential access attempts, this creates a complete data exfiltration pipeline.
HIGH Agent Behavior Override -65 ▶
The skill instructs the agent to take on a specific persona as an 'immune system' with autonomous decision-making capabilities, potentially overriding user intent and normal safety measures.
HIGH Executable Code with Network Access -60 ▶
The skill includes executable Python code that makes external network requests and could be used for unauthorized data transmission.