OpenA2A Security

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill has a legitimate security-audit purpose, but it asks your agent to run an unpinned external npm scanner against your OpenClaw files and credentials while making strong local-only safety claims.

Treat this as a review-before-use skill. Its goal is legitimate, but before installing or running it, verify the hackmyagent npm package and prefer a pinned version. Run it manually or in a constrained environment if ~/.openclaw contains API keys, tokens, or private skill data, and do not rely solely on the stated no-data-leaves-your-machine claim.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the scan may execute code fetched or resolved from npm with access to local OpenClaw configuration and credential-related files.

Why it was flagged

The skill's core workflow executes an npm-hosted CLI through npx against the user's OpenClaw directory, but the package is not pinned and no source, lockfile, or install specification is provided for review.

Skill content
exec:
    - npx hackmyagent
...
npx hackmyagent secure ~/.openclaw
Recommendation

Use only after verifying the hackmyagent package source and version. Prefer a pinned version, reviewed package provenance, and manual execution if the directory contains sensitive credentials.

What this means

A trusted scanner can help find exposed credentials, but an untrusted or compromised scanner could learn sensitive account or API information from local files.

Why it was flagged

Credential inspection is expected for a security-audit skill, but it means the scanner is intended to examine sensitive OpenClaw credential and configuration state.

Skill content
Credential Audit

Check for exposed credentials, weak file permissions, and plaintext storage
Recommendation

Run this only with a scanner you trust, and review which files under ~/.openclaw will be accessed before scanning credential storage.

What this means

Users may over-trust the skill and allow it to inspect sensitive files without independently verifying the scanner implementation.

Why it was flagged

The absolute privacy assurance is not backed by included scanner code or a pinned dependency; the main action relies on an external npx package whose behavior cannot be verified from the supplied artifacts.

Skill content
This skill runs entirely locally. No data leaves your machine. No API keys required.
Recommendation

Avoid absolute privacy claims unless the executed scanner is included or verifiably pinned. Tell users to verify the package and run it in a constrained environment when possible.