Zai Usage

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This usage monitor largely does what it says, but it requires a Z.AI browser session JWT that the registry does not declare as a credential and stores/sources it from local files.

Review this skill before installing. It appears to query only the Z.AI quota endpoint, but it depends on a browser-session JWT stored locally. Treat that token like a password: put it in `~/.openclaw/secrets/zai.env`, run `chmod 600` on the file, do not share logs or files containing it, and revoke/refresh the token if you suspect exposure.

Static analysis

Static analysis findings are pending for this release.

VirusTotal

66/66 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If this token is exposed or mishandled, someone may be able to act as the user against Z.AI services within whatever access that session token allows.

Why it was flagged

The skill asks the user to extract and store a browser-session JWT, which is a sensitive account credential, while the registry metadata lists no primary credential and no required environment variables.

Skill content
Get your JWT token from https://z.ai/manage-apikey/subscription ... Application → Local Storage → `z-ai-open-platform-token-production` ... Store in `~/.openclaw/secrets/zai.env`: `ZAI_JWT_TOKEN=eyJhbGci...`
Recommendation

Only install if you are comfortable giving the skill access to this Z.AI session token; store it in a protected secrets file, revoke/refresh it if exposed, and the publisher should declare the credential requirement in metadata.

What this means

Users may believe the stored session token is locked down when the documented setup may leave permissions dependent on their shell umask or existing file settings.

Why it was flagged

The README claims the token file uses 600 permissions, but the documented setup command only writes the file with `echo ... > ~/.openclaw/secrets/zai.env` and does not show a `chmod 600` step.

Skill content
Security

- Tokens are stored in `~/.openclaw/secrets/zai.env`
- Never displayed in logs or responses
- File permissions: `600` (owner read/write only)
Recommendation

After creating the token file, run `chmod 600 ~/.openclaw/secrets/zai.env`; the publisher should add this command to setup or avoid making an unconditional permission claim.

What this means

If one of these env files is modified by another process or user, running the skill could execute unexpected shell commands.

Why it was flagged

The script loads environment files with shell `source`, which executes their contents. This is common for env-file loading but means those files must be trusted.

Skill content
source ~/.openclaw/secrets/zai.env ... source "$SKILL_DIR/.env" ... source ~/.zai.env
Recommendation

Keep these env files owner-writable only, avoid adding anything except simple `ZAI_JWT_TOKEN=...` assignments, and prefer parsing env files without executing them where possible.