返回顶部
H

HIIC-skill-vetter

Practical skill vetting workflow for AI agents. Prioritizes clear yes/no risk judgments, concise conclusions, and business-aware risk tolerance before installing a skill.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
94
下载量
0
收藏
概述
安装方式
版本历史

HIIC-skill-vetter

# HIIC Skill Vetter A practical, business-aware vetting workflow for OpenClaw skills. Goal: give a **short, clear conclusion** about whether a skill is safe to use, without over-penalizing normal capabilities like external API access, scheduled tasks, screenshots, or documented platform credentials. --- ## When to Use Use this skill when: - the user asks whether a skill is safe - the user wants a quick vet before installing a skill - the user wants a concise risk conclusion instead of a long report - the user wants a portfolio-wide skill review --- ## Core Policy ### Default stance A skill is considered **safe by default** unless there is evidence of one of the following: - privilege escalation - hidden or unrelated sensitive-data access - hidden external exfiltration - dynamic execution of untrusted input - obvious behavior beyond the claimed scope ### Important calibration rules The following **do not automatically make a skill unsafe**: - documented external API access - reading `.env`, tokens, cookies, or API keys that are clearly required for the skill's purpose - cron / session / service / screenshot / browser state features - package installation steps that are explicit and relevant - platform/account integration when it is the point of the skill These should usually be treated as: - normal capability, or - caution item, not rejection --- ## Judgment Standard Output should be short and explicit. Use this format: ```text SKILL VETTING REPORT ═══════════════════════════════════════ Skill: [name] Source: [local / GitHub / ClawHub / other] ─────────────────────────────────────── RISKS: • External Access: [Yes / No] • Sensitive Access: [Yes / No / Required for stated purpose] • Dynamic Execution: [Yes / No] • Privilege Escalation: [Yes / No] • Scope Mismatch: [Yes / No] ─────────────────────────────────────── RISK LEVEL: [🟢 LOW / 🟡 MEDIUM / 🟠 HIGH] VERDICT: [✅ SAFE TO INSTALL / ⚠️ INSTALL WITH CAUTION / 🛑 HUMAN REVIEW RECOMMENDED] NOTES: [1-3 short lines] ═══════════════════════════════════════ ``` Keep the conclusion concise. Do not generate a long audit unless the user explicitly asks. --- ## Decision Rules ### ✅ SAFE TO INSTALL Use when: - no privilege escalation found - no suspicious unrelated sensitive access found - no hidden exfiltration found - behavior matches the skill's stated purpose Typical examples: - weather skills - summarizers - search tools - GitHub helpers - browser helpers - document tools ### ⚠️ INSTALL WITH CAUTION Use when: - the skill touches accounts, cookies, cloud resources, tokens, or publishing flows - but that access is clearly related to the skill's purpose - and there is no evidence of malicious or hidden behavior Typical examples: - social publishing tools - cloud storage tools - document platform integrations - account-bound automation tools ### 🛑 HUMAN REVIEW RECOMMENDED Use when: - there is real ambiguity about scope - or the skill reads sensitive material not clearly required - or the skill contains dynamic execution, suspicious remote behavior, or unclear hidden logic Do **not** use this level just because a skill uses tokens, APIs, cron, screenshots, or service config for legitimate reasons. --- ## What Actually Counts as High Risk Treat these as strong warning signals: - `sudo`, privileged system modification, or elevated install requirements - `eval`, `exec`, `bash -c`, `sh -c`, subprocess execution with untrusted input - reading unrelated secrets or private files without business justification - hidden telemetry or undocumented outbound endpoints - obvious mismatch between claim and implementation - encoded/obfuscated payloads tied to execution or exfiltration --- ## Practical Review Workflow 1. Read `SKILL.md` 2. Review helper scripts and config 3. Identify whether sensitive/platform access is **required for the stated purpose** 4. Look for actual high-risk behavior 5. Return a short conclusion If a repeatable scan helps, use: ```bash python3 vet_scan.py <skill-dir> python3 vet_scan.py <skill-dir> --format json ``` --- ## Review Philosophy - Business-required permissions are not automatic red flags. - A platform integration skill will naturally touch platform credentials. - A browser automation skill will naturally touch cookies/session state. - A cloud skill will naturally touch API keys and remote resources. - The question is not “does it have permissions?” - The question is: **“does it use those permissions in a way that is expected, explicit, and limited to its purpose?”** --- ## Remember Aim for good judgment, not paranoia theater. If there is no concrete sign of malicious or over-scoped behavior, do not overcall risk.

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 hiic-skill-vetter-1776028285 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 hiic-skill-vetter-1776028285 技能

通过命令行安装

skillhub install hiic-skill-vetter-1776028285

下载 Zip 包

⬇ 下载 HIIC-skill-vetter v1.0.0

文件大小: 12.76 KB | 发布时间: 2026-4-13 10:33

v1.0.0 最新 2026-4-13 10:33
HIIC-skill-vetter v1.0.0

- Initial release providing a practical, business-aware vetting workflow for AI agent skills.
- Focuses on concise yes/no risk judgments and clear conclusions for installation decisions.
- Defines default safety standards and explicit criteria for escalating risk levels.
- Calibrates normal capabilities (like API access, scheduled tasks, and documented credentials) as standard or caution items, not automatic red flags.
- Supplies a checklist format for vetting and a short review process to streamline decisions.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部