OpenClaw Session Logs
PassAudited by VirusTotal on May 8, 2026.
Overview
Type: OpenClaw Skill Name: openclaw-session-logs Version: 1.0.0 The skill provides legitimate instructions and shell snippets (using jq, ripgrep, and awk) for an agent to search and analyze its own conversation history stored in the OpenClaw state directory. It contains no evidence of data exfiltration, malicious execution, or unauthorized access beyond the application's own log files (SKILL.md).
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
When invoked, the agent may inspect and summarize older local chats, including sensitive details that appeared in prior sessions.
The skill is designed to read persistent prior conversation logs, which may contain private user content, tool results, and stale instructions. This is disclosed and purpose-aligned, so it is a privacy/context-handling note rather than a concern.
Search your complete conversation history stored in session JSONL files.
Use it only when you intentionally want prior conversations searched; narrow requests by date, session, or keyword when possible, and treat retrieved text as historical evidence rather than authoritative instructions.
The agent may run local read-only searches over OpenClaw session files if asked about past conversations.
The skill provides local shell command examples using jq, rg, head, ls, awk, and related tools to read session files. The shown commands are read-only and aligned with the purpose, but command execution is part of the workflow.
rg -l "phrase" "$SESSION_DIR"/*.jsonl
Verify the agent ID and session directory before broad searches, keep commands read-only, and avoid inserting untrusted text into shell commands without safe quoting.
