Use Cautionnot manually reviewedsource-scannedevidence: source-scanned

coding-agent

Delegate coding tasks to Codex, Claude Code, or Pi agents via background process. Use when: (1) building/creating new features or apps, (2) reviewing PRs (spawn in temp dir), (3) refactoring large codebases, (4) iterative coding that needs file exploration. NOT for: simple one-liner fixes (just edit), reading code (use read tool), thread-bound ACP harness requests in chat (for example spawn/run Codex or Claude Code in a Discord thread; use sessions_spawn with runtime:"acp"), or any work in ~/clawd workspace (never spawn agents here). Claude Code: use --print --permission-mode bypassPermissions (no PTY). Codex/Pi/OpenCode: pty:true required.

49
overall score
Publisher
Version
bundled
Updated
2026-03-13
Tags
generalunreviewed

Higher-privilege capability areas are present (token), but that alone is not evidence of malicious behavior.

Install decision: Broader capability surface, not a lower-friction local install.
Caution signal
Privileged but not suspicious by default
Review state
Static analysis only
Evidence points
19
Capability surface
5 capability signals
evidence snapshotnot tested yetnot tested yetno manual review yetsource-scanned evidence
Top row only: current live test result, deeper follow-on result, review presence, and evidence level. Each runtime badge is a quick human summary, not just an internal lane name.

โœ‰๏ธ Quick review

No runtime postcard yet for this skill. Static evidence is available below, but the runtime lane has not touched it yet.

Evidence strengthStronger evidence: local static scan available
Evidence basisSource-aware static scan of the skill directory
Current runtime resultNo live runtime receipt yet, so the page is still relying on static evidence only.

Before you install

โœ… Good fit if...
  • You are specifically looking for general / unreviewed workflows.
๐Ÿงฐ Before you install...
  • Expect setup work: this skill references 11 env vars.
  • Assume outside service calls are part of the story: 1 external domain reference showed up.
  • Expect local command execution or subprocess behavior, not just polite in-memory logic.
โš ๏ธ Watch out for...
  • The capability surface is non-trivial: this skill touches higher-privilege or higher-impact areas.
  • No runtime verdict yet, so you are leaning harder on static evidence and documentation quality.

Why this label

This landed in Use Caution because the capability surface or ambiguity is high enough to warrant extra scrutiny.

Uncertainty: Confidence is capped here because this entry relies more on metadata and heuristics than direct source evidence.

Evidence strengthStronger evidence: local static scan available
Suspicious signals0
Higher-impact signals1
Env / secret refs11
Network refs1
Shell signals5

Capability surface and suspicious signals

Capability surface

These increase access or impact, but they are not the same thing as deceptive or malicious behavior.

env vars: 11external refs: 1shell / subprocess usefile write signalshigher-impact domains

Capability summary

Requires secrets or environment variables to unlock full functionality.References external services or network endpoints.Can invoke shell commands or subprocess-style behavior.
+ 2 more
Contains signs of writing, publishing, or persisting output.Touches higher-impact domains like messaging, credentials, finance, or posting.

Suspicious behaviors

These are the signals that count much more heavily against the score.

no suspicious behavior detected
No suspicious implementation patterns were detected in the current scan.

Evidence

Env vars
ACPCRITICALCRUD
+ 8 more
LIVENEVERNOTPTYRESTREVIEW_DIRSCRATCHXXX
Domains
github.com/user/repo.git
Binaries
ghbash
Shell signals
shellbashsh
+ 2 more
terminalcommand:
Suspicious
None detected

Read this section in two layers: capability surface shows what the skill can touch, while suspicious signals show what looks deceptive or riskier than ordinary integrations.

๐Ÿงช Technical runtime details

No runtime suite recorded yet for this skill.

Publisher and provenance

Bundled with the local OpenClaw installation. That improves provenance clarity, but it does not eliminate privilege or external-action risk.

Source type: local-skill-dir

Source path: /home/claw1/.npm-global/lib/node_modules/openclaw/skills/coding-agent

Manual review

No human review yet. The scorecard is currently static-analysis-first.

Community signals

Community signals

These are community attention markers, not crowd-sourced truth. Click what feels especially worth flagging or reviewing.

Related skills