ecto-connection
Dangerous skill exposes the host to remote code execution by directing users to run `./scripts/connect.sh`, which invokes `/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"` and uses `sudo` to start services. It stores and shares secrets in `~/.openclaw/ecto-credentials.json` and makes external requests to Tailscale and funnel URLs like `https://<machine>.tail<xxxxx>.ts.net/v1/chat/completions`.