Is jjjojoj/openclaw-work-protocol safe?
https://github.com/openclaw/skills/tree/main/skills/jjjojoj/openclaw-work-protocol
The openclaw-work-protocol skill is a Chinese-language behavioral methodology document for AI agents — it contains no executable code, no external URL fetches, no hidden instructions, and no credential access attributable to the skill itself. The six canary file reads observed in monitoring are consistent with the monitoring infrastructure's own PAM authentication and canary-verification bookends (pre-clone and post-install), and all files were confirmed intact with read-only access throughout. The primary residual concerns are the skill's shell-first tool selection preference and its persistent-memory-write pattern, both low risk in isolation but worth noting for deployments handling sensitive data.
Category Scores
Findings (9)
LOW Highest-priority framing in user requirements section -7 ▶
The skill labels its user requirements section '最高优先级' (highest priority). The intent is that user goals take precedence over agent passivity, which is benign. However, this phrasing could be cited by a compromised agent or in combination with another skill to argue these instructions supersede other system-level guidance injected elsewhere.
LOW Shell-first tool selection hierarchy -5 ▶
The skill mandates shell commands (curl, wget, grep, awk, sed) as the highest-priority tool category above Python/Node.js and browser automation. This creates a durable shell-first preference in any agent running this skill. While operationally reasonable, this preference directly enables network exfiltration operations if the agent is also given instructions — or encounters prompt injection — that directs data movement.
INFO Persistent local memory-write instructions accumulate session context -8 ▶
The skill directs the agent to write session context to local files on a scheduled basis (daily logs at memory/YYYY-MM-DD.md, running learning-log.md, weekly MEMORY.md syncs). These writes are local-only and do not constitute exfiltration by themselves. However, the resulting files could accumulate sensitive user data, API responses, or system information that persists across sessions and is accessible to future skills or a compromised agent.
INFO Shell tool preference maintains network-capable exfiltration path -5 ▶
By establishing curl and wget as first-choice utilities, the skill ensures the agent will reach for network-capable tools first when any file-movement task arises. Combined with access to the persistent memory files described above, this creates a low-friction path for data exfiltration if other instructions or injections request it.
INFO Pure Markdown — no executable code surface -2 ▶
The skill contains only two files: SKILL.md (Markdown) and _meta.json (metadata). Checks for package.json, .gitattributes, .gitmodules, .githooks/, and symlinks all returned empty. The install was a clean sparse-checkout with no filesystem writes outside the designated skill directory.
INFO Canary credential files read post-install — attributed to monitoring infrastructure -15 ▶
Six canary files (.env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, .config/gcloud/application_default_credentials.json) were opened and read at timestamp 1771901864.748, after skill installation. Surrounding auditd records show a new authorized_keys read at 1771901864.442 (new SSH session established) immediately before these accesses, consistent with PAM authentication stack reads during the monitoring system's final canary-verification pass. No outbound data transfer to any non-GitHub IP was observed in the network capture.
INFO Canary files opened read-only at monitoring bookend timestamps — confirmed intact -15 ▶
All six canary files were read (never written) at two monitoring bookend points: pre-clone at 1771901845.903 and post-install at 1771901864.748. The monitoring system explicitly confirmed all files intact. The CLOSE_NOWRITE flag on every close confirms no data was altered. Both read events correspond to monitoring infrastructure behavior (PAM authentication and canary-integrity verification), not to any action attributable to SKILL.md content.
INFO Shell-first preference could amplify unintended network operations -10 ▶
When active, this skill ensures the agent reaches for curl/wget before higher-level abstractions. The autonomous problem-solving mandate ('遇到问题自己搞定') further reduces friction for network operations. If a user instruction, another skill, or injected content directs data movement, the agent will use network-capable shell tools without additional prompting.
INFO Long-lived context accumulation across sessions -8 ▶
The skill's persistent memory architecture creates a growing store of agent context spanning multiple sessions. In privacy-sensitive deployments this could contain API responses, user data, file contents, or credentials seen during previous sessions, all of which could be accessed by a future malicious skill or leaked via the memory-write pattern.