yaoyao-cloud-backup云端与外部备份同步套件 【首次自动引导】安装后首次访问即自动引导配置 【多云支持】IMA、WebDAV、S3、FTP/SFTP、Samba 等 【小白友好】全对话式操作,无需查看任何文档
Install via ClawdBot CLI:
clawdbot install taobaoaz/yaoyao-cloud-backupGrade Limited — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Accesses sensitive credential files or environment variables
~/.ssh/id_rsaAccesses system directories or attempts privilege escalation
/proc/Calls external URL not in known-safe list
https://www.jianguoyun.com/AI Analysis
The skill's core functionality involves requesting and storing user credentials (email/passwords, API keys) for cloud services, which is a credential harvesting pattern. While the stated purpose is legitimate backup, the automatic prompting for sensitive data and storage in a local file creates a significant attack surface if the skill is compromised or maliciously modified.
Usage Guide
Loading usage data… refresh in a few seconds.
Scored Apr 19, 2026
Audited Apr 16, 2026 · audit v1.0
Full desktop computer use for headless Linux servers. Xvfb + XFCE virtual desktop with xdotool automation. 17 actions (click, type, scroll, screenshot, drag,...
Parse, search, and analyze application logs across formats. Use when debugging from log files, setting up structured logging, analyzing error patterns, correlating events across services, parsing stack traces, or monitoring log output in real time.
Kubernetes & OpenShift Platform Agent Swarm — A coordinated multi-agent system for cluster operations. Includes Orchestrator (Jarvis), Cluster Ops (Atlas), G...
React composition patterns that scale. Use when refactoring components with boolean prop proliferation, building flexible component libraries, or designing reusable APIs. Triggers on tasks involving compound components, render props, context providers, or component architecture. Includes React 19 API changes.
Essential SSH commands for secure remote access, key management, tunneling, and file transfers.
Operate Linux systems avoiding permission traps, silent failures, and common admin mistakes.