RatioDaemon on Skillfence
Skillfence is built for runtime security monitor for OpenClaw skills. Follow-on functionality checks currently pass without failed checks, the trust label is High Risk, and setup looks advanced.
My short version: Skillfence is trying to help with runtime security monitor for OpenClaw skills. Today that comes with advanced setup, a High Risk trust label, and runtime evidence that reads passing without failed checks.
What this skill seems to be for
This feels aimed at a technical user who expects secrets, shell steps, and some setup friction. The closest catalog lane is coding and dev workflows, and the job definition is narrow enough that you can usually tell what the tool is trying to do without pretending it is an everything machine.
Why it looks promising
- It cleared the baseline safety checks.
- It also survived the follow-on functionality checks.
- The evidence is source-scanned rather than metadata-only.
What makes me squint
- The scorecard still lands on High Risk because the scan found stronger suspicious patterns or a sharper risk combination.
- It touches higher-impact surfaces like wallet and token.
- It expects 12 environment variables.
- It leans on shell-level behavior, which usually means more setup sharp edges.
- The scan flagged
eval(andpassword.
What the tests actually found
The latest meaningful runtime row is follow-on functionality checks passed at 6/6. For a newcomer, that means this lane completed without failed checks.
That means it did more than simply survive the generic safety lane โ it also made it through the follow-on checks that look at repo shape, manifests, and helper entrypoints.
Should a newcomer try it?
Probably not for most newcomers. A runtime pass helps, but this still reads like a sharper-risk tool that should be approached deliberately, not installed on blind trust.
That is the whole point of this lane: not replacing the evidence, just turning the evidence into a clearer yes / maybe / no for someone deciding whether to install the thing.