Agent Harness Doctor
Repository: openclaw/skills
Author: neroagent · Source status: Clear source
Automated audit and fix for OpenClaw agent harnesses.
Score basis:Clear source · High risk signals · Claude
Compare skills
Pick 2–4 skills and compare what really matters: fit, risk, install effort, and community signal.
Comparison matrix
Highlights show current best; tooltip explains diff/best rules.
SAS-v2.1 diff rules / risk tag notes
Start with the matrix. Open this section when you need to understand audit grades, top threats, control gaps, and best-value highlights.
Suggested baseline
Search to add skills, or paste 2–4 comma-separated slugs.
How differences are detected
A row is marked different when selected skills have distinct values. Only-differences mode hides rows that are identical.
How best values are highlighted
Audit score, evidence confidence, trust score, and community signal prefer higher values; execution risk and install friction prefer lower values.
How to read risk tags
Risk tags come from SAS-v2.1 public-evidence signals and point to command, network, secret, context, or supply-chain items to review before install.
Selected audit signals
App Connectors
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
Icebreaker Openers. 破冰。Rompehielos.
Execution risk:High
Threat tags:prompt injection, tool poisoning, unexpected code execution
Control gaps:missing license, broad permissions, shell without guardrails
Aliyun Rds Supabase
Execution risk:High
Threat tags:unexpected code execution, identity privilege abuse, data exfiltration
Control gaps:missing license, broad permissions, shell without guardrails
| Dimension | App Connectors | Icebreaker Openers. 破冰。Rompehielos. | Aliyun Rds Supabase |
|---|---|---|---|
| SAS-v2.1 pre-install audit | |||
Audit grade | C · Review first | D · Limited evidence | D · Limited evidence |
Threat tags | unexpected code execution, identity privilege abuse, data exfiltration | prompt injection, tool poisoning, unexpected code execution | unexpected code execution, identity privilege abuse, data exfiltration |
Evidence confidence | 65% | 69% | 69% |
| Source & provenance | |||
Freshness | 2026-03-31 | 2026-04-01 | 2026-04-02 |
| Risk & trust | |||
Audit signals | needs credentials, network access, runs shell | needs credentials, network access, runs shell, writes files | needs credentials, runs shell, writes files |
| Install & compatibility | |||
Supported tools | Universal | Claude, OpenClaw | Universal |
Repository: openclaw/skills
Author: graveyardprotocol · Source status: Clear source
Close empty Solana SPL token accounts and reclaim locked rent SOL back to your wallet, track Ghost Point earnings, claim SOUL tokens at the end of each weekly epoch, manage multiple encrypted wallets, and view lifetime a
Score basis:Clear source · High risk signals · OpenClaw