OpenClaw Session Logs

PassAudited by VirusTotal on May 8, 2026.

Overview

Type: OpenClaw Skill Name: openclaw-session-logs Version: 1.0.0 The skill provides legitimate instructions and shell snippets (using jq, ripgrep, and awk) for an agent to search and analyze its own conversation history stored in the OpenClaw state directory. It contains no evidence of data exfiltration, malicious execution, or unauthorized access beyond the application's own log files (SKILL.md).

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

When invoked, the agent may inspect and summarize older local chats, including sensitive details that appeared in prior sessions.

Why it was flagged

The skill is designed to read persistent prior conversation logs, which may contain private user content, tool results, and stale instructions. This is disclosed and purpose-aligned, so it is a privacy/context-handling note rather than a concern.

Skill content
Search your complete conversation history stored in session JSONL files.
Recommendation

Use it only when you intentionally want prior conversations searched; narrow requests by date, session, or keyword when possible, and treat retrieved text as historical evidence rather than authoritative instructions.

What this means

The agent may run local read-only searches over OpenClaw session files if asked about past conversations.

Why it was flagged

The skill provides local shell command examples using jq, rg, head, ls, awk, and related tools to read session files. The shown commands are read-only and aligned with the purpose, but command execution is part of the workflow.

Skill content
rg -l "phrase" "$SESSION_DIR"/*.jsonl
Recommendation

Verify the agent ID and session directory before broad searches, keep commands read-only, and avoid inserting untrusted text into shell commands without safe quoting.