multiAI Summary Pending

skill-safe-install-l0-strict

Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to install a skill safely, inspect skill permissions, review third-party skill risk, or run a pre-install security audit. Enforce full review + sandbox + explicit consent gates, with no author-based trust bypass.

3,556 stars

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/skill-safe-install-l0-strict/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/1231qaz2wsx/skill-safe-install-l0-strict/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/skill-safe-install-l0-strict/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How skill-safe-install-l0-strict Compares

Feature / Agentskill-safe-install-l0-strictStandard Approach
Platform SupportmultiLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Strict secure-install workflow for ClawHub/OpenClaw skills. Use when asked to install a skill safely, inspect skill permissions, review third-party skill risk, or run a pre-install security audit. Enforce full review + sandbox + explicit consent gates, with no author-based trust bypass.

Which AI agents support this skill?

This skill is compatible with multi.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Skill Safe Install (L0 Strict)

Enforce a conservative, auditable install workflow.

## Purpose

Use this skill to reduce accidental or risky third-party skill installs:
- Force risk review before installation.
- Require sandbox verification before formal install.
- Require explicit user confirmation before sensitive actions.
- Avoid hidden trust escalation (no author-based bypass, no implicit allowBundled writes).

## Non-negotiable rules

1. Never skip steps.
2. Never auto-trust by author, popularity, or “official-looking” name.
3. Never modify persistent config (`openclaw.json`) without explicit user consent in the current conversation.
4. If risk cannot be evaluated, treat as high risk and pause.

## Workflow (Step 0 → Step 6)

### Step 0 — Confirm target

- Resolve exact skill slug and (if available) version.
- If input is ambiguous, ask for confirmation before install.

Suggested checks:
- `clawhub search <query>`
- Verify exact slug/version from results.

### Step 1 — Duplicate/state check

- Check whether the skill is already installed.
- Check current trust state (whether already in `skills.allowBundled`).

Suggested checks:
- `clawhub list`
- Read `~/.openclaw/openclaw.json` (or platform-equivalent config path)

### Step 2 — Mandatory security review (no whitelist bypass)

Run inspect and summarize at least:

1. Maintainer/source and recent update signal
2. Required secrets/credentials (API keys, OAuth, tokens)
3. Network/system access scope
4. Command execution or file-system mutation risk
5. Persistence behavior (config edits, auto-run, always-on behavior)

Suggested check:
- `clawhub inspect <skill>`

#### Risk rating rubric

- **LOW**: Text/process guidance only, no credentials, no system mutation.
- **MEDIUM**: Requires limited credentials or external API access with clear scope.
- **HIGH**: Broad command execution, config mutation, or multi-system OAuth.
- **CRITICAL**: Destructive capability, privilege escalation, stealth persistence, or unclear behavior.

#### Gate policy

- LOW / MEDIUM: Continue to sandbox.
- HIGH: Continue only after explicit confirmation.
- CRITICAL: Do not install by default; require explicit override and warn strongly.

### Step 3 — Sandbox install (isolated workdir)

Install in a temporary isolated directory first.

- Use isolated workdir (do not install to primary skill directory yet).
- Confirm install result and basic behavior.
- If sandbox fails, stop.

Example pattern:
- `clawhub --workdir <temp_dir> --dir skills install <skill>`

### Step 4 — User confirmation checkpoint

Before formal install, present:
- Chosen skill slug/version
- Risk rating + top risks
- Sandbox result
- Exact next action

Proceed only after explicit “yes/install/继续”.

### Step 5 — Formal install

Run formal install only after Step 4 consent.

Example:
- `clawhub install <skill>`

If install fails, stop and report error + rollback advice.

### Step 6 — Optional trust persistence (`allowBundled`)

Default is **do not write** trust list.

Only perform this step when user explicitly asks to persist trust.

Required safeguards:
1. Backup config with timestamp.
2. Show exactly what key will change (`skills.allowBundled`).
3. Append skill slug only if absent (idempotent).
4. Confirm backup path and rollback command.

Do not use hidden or implicit trust writes.

## Output format (required)

- `[Step 0/6] Target: ...`
- `[Step 1/6] State: ...`
- `[Step 2/6] Review: risk=LOW|MEDIUM|HIGH|CRITICAL; findings=...`
- `[Step 3/6] Sandbox: pass|fail`
- `[Step 4/6] Consent: pending|approved|denied`
- `[Step 5/6] Install: pass|fail`
- `[Step 6/6] Trust write: skipped|pending|written`

## Refusal conditions

Stop and ask for confirmation/override when any condition is met:
- Skill identity is ambiguous.
- Inspect output is unavailable or incomplete.
- Risk is HIGH/CRITICAL and user has not explicitly approved.
- Requested config mutation lacks explicit consent.