๐Ÿ›ก๏ธ SafeAgentSkills

Migrate

View on ClawHub โ†— ยท v1.0.0

โฌ‡ 1,240 downloads

Medium Risk

Export and import Clawdbot installations for migration between machines. Use when the user wants to migrate Clawdbot to a new computer, backup their setup, or restore from a backup. Handles workspace files, config, WhatsApp sessions, and optionally credentials.

H:3 D:0 A:0 C:1

โš ๏ธ Hazard Flags

EXEC FS_DELETE

๐Ÿ“‹ Capabilities

Execution

  • โœ… Shell execution
  • โŒ Code execution
  • โŒ Install dependencies
  • โŒ Persistence
  • Privilege: user

Filesystem

  • โŒ Read workspace
  • โŒ Write workspace
  • โŒ Read home
  • โŒ Write home
  • โŒ Read system
  • โœ… Delete

Network

  • Egress: none
  • โŒ Ingress

Credentials

  • โŒ Environment vars
  • โŒ Credential files
  • โŒ Browser data
  • โŒ Keychain

Actions

โŒ send messagesโŒ post publicโŒ purchaseโŒ transfer moneyโŒ deployโŒ delete external

๐Ÿ”’ Containment

Level: elevated

Required:
  • SANDBOX_CONTAINER: Code execution capability
Recommended:
  • LOG_ACTIONS: Audit trail for all actions

โšก Risks

Unauthorized tool use: INSTRUCTED_BINARY_INSTALL, MCP_SYS_FILE_DESTRUCTION, MCP_SYS_CRITICAL_ACCESS critical

Mitigation: Avoid instructing agents to install arbitrary binaries; bundle dependencies or use sandboxed environments

Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION low

Mitigation: Provide clear, detailed description of skill functionality

Tool poisoning: hidden behaviors detected (MCP_TOOL_POISONING_REMOTE_STORAGE) medium

Mitigation: Document all remote data storage. Avoid storing sensitive data externally.

Want a deeper analysis?

This report was generated by static analysis. Get an LLM-powered deep review with behavioral reasoning and attack surface mapping.

๐Ÿง  Deep Analysis โ€” $5.00

๐Ÿšจ Incident Response

Kill switch: Stop the agent process

Containment: Review logs for unexpected actions

Recovery: Depends on skill capabilities

๐Ÿ“„ Raw SSDS JSON click to expand
{
  "meta": {
    "document_id": "ssds:auto:migrate:1.0.0",
    "ssds_version": "0.2.0",
    "scanner_version": "0.4.0+fe6fd9123d50",
    "created_at": "2026-03-05T11:44:46.972Z",
    "created_by": {
      "agent": "safeagentskills-cli/generate-ssds"
    },
    "language": "en",
    "notes": "Auto-generated SSDS. Manual review recommended."
  },
  "skill": {
    "name": "Migrate",
    "version": "1.0.0",
    "format": "agent_skill",
    "description": "Export and import Clawdbot installations for migration between machines. Use when the user wants to migrate Clawdbot to a new computer, backup their setup, or restore from a backup. Handles workspace files, config, WhatsApp sessions, and optionally credentials.",
    "publisher": "ClawHub",
    "source": {
      "channel": "clawhub",
      "slug": "migrate",
      "owner": "MrGoodB",
      "downloads": 1240,
      "stars": 0
    },
    "artifact": {
      "sha256": "626acb7b72dd81c523fa2251e703156221ac4748d77befb7a59c061920b64158",
      "hash_method": "files_sorted"
    }
  },
  "capabilities": {
    "execution": {
      "can_exec_shell": true,
      "can_exec_code": false,
      "privilege_level": "user",
      "can_install_deps": false,
      "can_persist": false
    },
    "filesystem": {
      "reads_workspace": false,
      "reads_user_home": false,
      "reads_system": false,
      "writes_workspace": false,
      "writes_user_home": false,
      "writes_system": false,
      "can_delete": true
    },
    "network": {
      "egress": "none",
      "ingress": false
    },
    "credentials": {
      "reads_env_vars": false,
      "reads_credential_files": false,
      "reads_browser_data": false,
      "reads_keychain": false
    },
    "services": [],
    "actions": {
      "can_send_messages": false,
      "can_post_public": false,
      "can_purchase": false,
      "can_transfer_money": false,
      "can_deploy": false,
      "can_delete_external": false
    },
    "prompt_injection_surfaces": [],
    "content_types": [
      "general"
    ]
  },
  "hazards": {
    "hdac": {
      "H": 3,
      "D": 0,
      "A": 0,
      "C": 1
    },
    "flags": [
      "EXEC",
      "FS_DELETE"
    ],
    "custom_flags": [
      {
        "code": "FILE_DELETE",
        "name": "File Deletion",
        "description": "Can delete files in: scripts/import.sh, scripts/export.sh"
      },
      {
        "code": "TOOL_ABUSE",
        "name": "Unauthorized Tool Use",
        "description": "INSTRUCTED_BINARY_INSTALL, MCP_SYS_FILE_DESTRUCTION, MCP_SYS_CRITICAL_ACCESS: Instructs agent to install external binary or package"
      },
      {
        "code": "SOCIAL_ENGINEERING",
        "name": "Social Engineering Risk",
        "description": "SOCIAL_ENG_VAGUE_DESCRIPTION: Skill description is too vague or missing"
      },
      {
        "code": "TOOL_POISONING",
        "name": "Tool Poisoning",
        "description": "Hidden secondary behavior detected: MCP_TOOL_POISONING_REMOTE_STORAGE"
      }
    ],
    "confidence": {
      "level": "medium",
      "basis": [
        "static_analysis"
      ],
      "notes": "Detected 4 security patterns (11 vendored rule hits). Review recommended."
    },
    "rationale": {
      "H": "H3: Shell/code execution or persistence detected",
      "D": "D0: No sensitive data access",
      "A": "A0: No side effects detected",
      "C": "C1: General content"
    }
  },
  "containment": {
    "level": "elevated",
    "required": [
      {
        "control": "SANDBOX_CONTAINER",
        "reason": "Code execution capability"
      }
    ],
    "recommended": [
      {
        "control": "LOG_ACTIONS",
        "reason": "Audit trail for all actions"
      }
    ],
    "uncontained_risk": "Risk level depends on manual review of actual capabilities."
  },
  "risks": {
    "risks": [
      {
        "risk": "Unauthorized tool use: INSTRUCTED_BINARY_INSTALL, MCP_SYS_FILE_DESTRUCTION, MCP_SYS_CRITICAL_ACCESS",
        "severity": "critical",
        "mitigation": "Avoid instructing agents to install arbitrary binaries; bundle dependencies or use sandboxed environments"
      },
      {
        "risk": "Social engineering indicators: SOCIAL_ENG_VAGUE_DESCRIPTION",
        "severity": "low",
        "mitigation": "Provide clear, detailed description of skill functionality"
      },
      {
        "risk": "Tool poisoning: hidden behaviors detected (MCP_TOOL_POISONING_REMOTE_STORAGE)",
        "severity": "medium",
        "mitigation": "Document all remote data storage. Avoid storing sensitive data externally."
      }
    ],
    "limitations": [
      "Static analysis only - runtime behavior not verified"
    ]
  },
  "incident_response": {
    "kill_switch": [
      "Stop the agent process"
    ],
    "containment": [
      "Review logs for unexpected actions"
    ],
    "recovery": [
      "Depends on skill capabilities"
    ]
  },
  "evidence": [
    {
      "evidence_id": "EV:file-1",
      "type": "file_excerpt",
      "title": "_meta.json",
      "file_path": "_meta.json"
    },
    {
      "evidence_id": "EV:file-2",
      "type": "file_excerpt",
      "title": "SKILL.md",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:file-3",
      "type": "file_excerpt",
      "title": "scripts/import.sh",
      "file_path": "scripts/import.sh"
    },
    {
      "evidence_id": "EV:file-4",
      "type": "file_excerpt",
      "title": "scripts/export.sh",
      "file_path": "scripts/export.sh"
    },
    {
      "evidence_id": "EV:cisco-1",
      "type": "file_excerpt",
      "title": "INSTRUCTED_BINARY_INSTALL [HIGH] SKILL.md:73: npm install -g clawdbot",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-2",
      "type": "file_excerpt",
      "title": "SOCIAL_ENG_VAGUE_DESCRIPTION [LOW] SKILL.md:1: ---",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-3",
      "type": "file_excerpt",
      "title": "MCP_TOOL_POISONING_REMOTE_STORAGE [MEDIUM] SKILL.md:22: - `--include-credentials` โ€” Include credentials โš ๏ธ handle with care",
      "file_path": "SKILL.md"
    },
    {
      "evidence_id": "EV:cisco-4",
      "type": "file_excerpt",
      "title": "MCP_SYS_FILE_DESTRUCTION [CRITICAL] scripts/import.sh:61: trap \"rm -rf $STAGING\" EXIT",
      "file_path": "scripts/import.sh"
    },
    {
      "evidence_id": "EV:cisco-5",
      "type": "file_excerpt",
      "title": "MCP_SYS_CRITICAL_ACCESS [HIGH] scripts/import.sh:1: #!/bin/bash",
      "file_path": "scripts/import.sh"
    },
    {
      "evidence_id": "EV:cisco-6",
      "type": "file_excerpt",
      "title": "MCP_SCRIPT_ANSI_DECEPTION [HIGH] scripts/import.sh:8: RED='\\033[0;31m'",
      "file_path": "scripts/import.sh"
    },
    {
      "evidence_id": "EV:cisco-7",
      "type": "file_excerpt",
      "title": "TIRITH_ANSI_ESCAPE_IN_STRING [HIGH] scripts/import.sh:8: RED='\\033[0;31m'",
      "file_path": "scripts/import.sh"
    },
    {
      "evidence_id": "EV:cisco-8",
      "type": "file_excerpt",
      "title": "MCP_SYS_FILE_DESTRUCTION [CRITICAL] scripts/export.sh:61: trap \"rm -rf $STAGING\" EXIT",
      "file_path": "scripts/export.sh"
    },
    {
      "evidence_id": "EV:cisco-9",
      "type": "file_excerpt",
      "title": "MCP_SYS_CRITICAL_ACCESS [HIGH] scripts/export.sh:1: #!/bin/bash",
      "file_path": "scripts/export.sh"
    },
    {
      "evidence_id": "EV:cisco-10",
      "type": "file_excerpt",
      "title": "MCP_SCRIPT_ANSI_DECEPTION [HIGH] scripts/export.sh:8: RED='\\033[0;31m'",
      "file_path": "scripts/export.sh"
    }
  ]
}