OpenClaw Bug Report

ReviewAudited by ClawScan on May 3, 2026.

Overview

This is a coherent OpenClaw bug-report helper, but it should be used carefully because it runs a local diagnostics script, collects redacted logs/config metadata, and may post reviewed text to GitHub.

Use this skill only when you want to collect OpenClaw diagnostics for a bug report. Start with the default conservative collection, review every generated file, share only selected redacted excerpts, and approve GitHub posting only after reading the final text. The visible artifacts do not justify wallet credentials or raw tokens, so do not provide them if asked.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the skill can execute local diagnostic commands and create files on the user's machine.

Why it was flagged

The skill instructs the agent/user to execute a bundled shell script. This is expected for diagnostics, but it is still local code execution and should be reviewed.

Skill content
bash /path/to/file-bug-report/scripts/collect-openclaw-diagnostics.sh --output ./openclaw-diagnostics
Recommendation

Run the script only when you intended to collect diagnostics, keep the default conservative options first, and inspect the generated bundle before sharing anything.

What this means

Private paths, plugin names, auth profile names, errors, prompts, or log excerpts could be included in local diagnostic files if not reviewed.

Why it was flagged

The diagnostics bundle may contain local config, log, git, and runtime context. The artifact includes good safeguards, but users still need to review stored diagnostic context before reuse or publication.

Skill content
Default output is intentionally conservative: it records config metadata rather than raw config content... Use `--include-private-config`, `--include-tmp-logs`, or `--include-git-details` only after explaining the risk and getting explicit user approval. Inspect every generated file before sharing.
Recommendation

Do not upload the full diagnostics directory. Share only selected, reviewed, redacted excerpts, and avoid the private-config/tmp-log/git-detail flags unless necessary.

What this means

A GitHub issue or comment could be posted under the user's account, and the report could reveal which provider/auth profile or workspace type was involved.

Why it was flagged

The workflow may include account/profile details and can create public GitHub content after user approval. This is purpose-aligned but uses the user's delegated identity if posting is allowed.

Skill content
Which model, provider, auth profile, workspace, and entrypoint were selected? ... User approves posting? ... Post issue or comment
Recommendation

Review the final issue/comment, selected GitHub account, target repository, and all environment/profile details before approving any post.

What this means

The registry signals could confuse users about whether sensitive credentials are needed.

Why it was flagged

The declared credential contract says no primary credential, while capability signals mention wallet/OAuth/sensitive credentials. The visible files do not justify wallet access, so this appears to be a metadata or signal mismatch rather than evidence of credential use.

Skill content
Primary credential: none ... Capability signals: crypto; requires-wallet; requires-oauth-token; requires-sensitive-credentials
Recommendation

Do not provide wallet credentials, raw tokens, or unrelated secrets to this skill. If runtime prompts request them, stop and verify with the publisher.