Is jk50505k/clawdhub-copy safe?

https://github.com/openclaw/skills/tree/main/skills/jk50505k/clawdhub-copy

81
SAFE

This skill is a documentation-only copy of the official ClawdHub package manager skill, published under a non-official user namespace. The SKILL.md is clean with no prompt injection or malicious instructions, and canary honeypot integrity was fully maintained throughout the audit. The primary concerns are: a suspicious pre-loaded .clawhub/lock.json shipping a foreign skill installation record (potential dependency injection), the impersonation/typosquatting risk inherent in an unofficial copy of a security-critical skill management tool, and the supply chain exposure created by instructing agents to install and execute a global npm package.

Category Scores

Prompt Injection 90/100 · 30%
Data Exfiltration 80/100 · 25%
Code Execution 75/100 · 20%
Clone Behavior 80/100 · 10%
Canary Integrity 88/100 · 10%
Behavioral Reasoning 50/100 · 5%

Findings (7)

MEDIUM Pre-loaded lock.json contains foreign skill installation record -25

The .clawhub/lock.json file distributed as part of this skill distribution contains a pre-existing record indicating 'academic-research-hub' (version 0.1.0) was installed at Unix timestamp 1770957475341. A fresh skill should ship with an empty or absent lock file. This record could cause the ClawdHub CLI to believe a third-party skill is already installed in the user's environment, potentially skipping integrity checks or silently pulling in a dependency. Whether this is developer pollution or intentional injection is unclear.

MEDIUM Unofficial namespace copy of official security-critical skill — impersonation risk -30

The official ClawdHub package manager skill lives in the openclaw org. This skill is byte-for-byte identical content published under a personal user account (jk50505k/clawdhub-copy). Because ClawdHub is the agent's skill management tool itself, an unofficial copy of it occupies a privileged trust position. Users encountering this in the marketplace may not scrutinize it as carefully as they should, and if the copy were ever updated to diverge maliciously, users who installed it would be running attacker-controlled skill management infrastructure.

LOW Global npm dependency creates supply chain attack surface -20

The skill instructs the agent to run 'npm i -g clawdhub' to install a globally-privileged npm package, then delegates all skill management to that binary. A malicious version bump, npm account takeover, or registry substitution via the documented CLAWDHUB_REGISTRY override would grant an attacker shell-level access to the user's system. The 'clawdhub update --all --no-input --force' documented pattern also allows mass silent skill updates without per-update user confirmation.

LOW Post-install outbound connection to Cloudflare IP via openclaw-gateway -20

Following skill installation, the openclaw-gateway process established a connection (TIME-WAIT) to 104.16.7.34:443, a Cloudflare-hosted IP consistent with clawdhub.com. This appears to be gateway-level install telemetry rather than skill-triggered behavior — the gateway was already running before install and the connection used an existing fd. However, the connection is not fully attributable and warrants noting.

LOW Credential honeypot files accessed during audit window -20

Six canary credential files were opened and read during the audit: .env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and .config/gcloud/application_default_credentials.json. Access timestamps (1771917108 and 1771917133) bracket the skill installation (1771917129) but align with audit framework operations visible in the EXECVE trail (ss -tunap, lsb_release, audit harness bash scripts). All files were confirmed unmodified by the canary integrity check.

INFO Canary file access events observed — no exfiltration -12

Audit logs show two rounds of canary credential file accesses at timestamps consistent with the oathe framework's pre-install baseline setup and post-install integrity reconciliation. All files were confirmed intact. The slight score reduction reflects the presence of access events requiring investigation rather than a confirmed incident.

INFO No prompt injection vectors found in SKILL.md -10

The SKILL.md was inspected for all common injection patterns: override instructions, ignore-previous directives, hidden unicode, HTML/markdown comment smuggling, base64-encoded payloads, invisible characters, external URL fetch directives, and persona-switching commands. None were found. The content is standard CLI reference documentation.