Is aryannate/qmd-skill-4 safe?
https://github.com/openclaw/skills/tree/main/skills/aryannate/qmd-skill-4
The qmd-skill-4 SKILL.md is a clean, well-structured documentation wrapper for the qmd local markdown search CLI tool with no prompt injection, hidden instructions, or malicious content detected in the skill repository itself. The primary risk is a supply chain dependency: the skill's install command fetches a binary from an external, unaudited GitHub repository (github.com/tobi/qmd) that auto-downloads AI model files at runtime, meaning the security posture of the actual tool is not covered by this audit. Canary file reads observed in monitoring are attributed to the audit framework's own baseline and integrity-check operations rather than the skill, and all canary files remain intact.
Category Scores
Findings (6)
MEDIUM Install fetches binary from unaudited external repository -20 ▶
The skill's install metadata specifies 'bun install -g https://github.com/tobi/qmd', which installs a binary globally from a GitHub repository not covered by this audit. The qmd binary, once installed, has persistent access to any file paths the user has indexed into collections. Any malicious code introduced into the tobi/qmd repository — now or in a future update — would not be detected by auditing this skill wrapper alone. The binary also auto-downloads GGUF model files on first semantic search invocation, creating additional unmonitored network egress outside the clone monitoring window.
LOW Canary credential files read during audit — attributed to framework, not skill -5 ▶
Inotify and auditd PATH records show .env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and gcloud application_default_credentials.json were opened at timestamps 1771919348.085–086 (pre-clone, 5 seconds before git clone begins) and again at 1771919372.872 (post-install, during final monitoring wrap-up). The canary integrity check authoritatively confirms all files are intact with no modification. Temporal analysis places the first access during sudo/SSH session authentication setup and the second during post-install canary verification — both consistent with audit framework activity rather than the skill. No skill-installed process is associated with these reads in the EXECVE audit log.
LOW Broad local filesystem retrieval capability with qmd get/multi-get -12 ▶
When the skill is active, the agent is instructed to use 'qmd get path/to/file.md' and 'qmd multi-get' commands that return full document content. If a user has indexed directories containing sensitive information (credentials in markdown files, notes with passwords, private keys stored as text), a benign-seeming user query ('find my notes on AWS') could cause the agent to retrieve and expose that content. The '--full' flag returns complete document content with no size limit mentioned.
LOW Cron job examples could enable agent-configured persistence -10 ▶
SKILL.md includes cron scheduling examples ('0 * * * * export PATH=... && qmd update') and explicitly suggests 'If your Clawdbot/agent environment supports a built-in scheduler, you can run the same commands there.' An agent following these instructions could configure scheduled persistence on the user's machine. While the stated purpose is index freshness, an attacker could leverage this pattern in combination with a malicious skill to establish a foothold.
INFO Clean GitHub connection for skill retrieval — expected 0 ▶
The installation made a single TCP connection to 140.82.121.4:443 (github.com) for the git sparse-checkout clone of the skills monorepo. This connection closed cleanly after install. No new persistent connections, listening ports, or background processes were observed post-installation.
INFO No prompt injection detected in SKILL.md 0 ▶
Full review of SKILL.md found no hidden instructions, invisible unicode characters, HTML/markdown comment tricks, persona-switching requests, or attempts to override system instructions. All content is legitimate documentation for a CLI tool. The frontmatter, trigger phrases, command examples, and performance notes are consistent with a genuine tool integration.