Openclaw Podcast

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: openclaw-podcast Version: 1.2.0 The OpenClaw Podcast skill transparently declares its high-risk capabilities, including network access to superlore-api.onrender.com, reading workspace files (memory/*.md, JOBS.md, HEARTBEAT.md, MEMORY.md), and optionally modifying shell profiles (~/.zshrc, ~/.bashrc) and scheduling cron jobs. The `scripts/generate-episode.js` file implements robust sanitization (`stripSecrets`, `sanitizeMemory`) to prevent API keys, tokens, emails, IPs, and agent internal instructions from being sent to the external API, and hardcodes `visibility: 'private'` for episodes. The `scripts/setup-crons.js` script performs shell profile modification and cron job scheduling only with explicit user confirmation. All actions are aligned with the stated purpose of generating personalized podcast briefings, and there is no evidence of malicious intent, obfuscation, or unauthorized data exfiltration.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Podcast episodes may be based on sensitive project notes, priorities, metrics, or blockers from your workspace.

Why it was flagged

The skill explicitly reads workspace memory files and uses the Superlore API to generate podcast briefings, so private work context may leave the local workspace.

Skill content
network: "HTTPS requests to superlore-api.onrender.com" ... filesystem: "Reads workspace files (memory/*.md, JOBS.md, HEARTBEAT.md, MEMORY.md)."
Recommendation

Use this only in workspaces whose contents you are comfortable sending to Superlore. Review dry-run output where available, avoid storing secrets in memory files, and verify episodes are created as private.

What this means

Anyone or any process that can read your shell profile may be able to access the Superlore API key.

Why it was flagged

The setup wizard can store the Superlore API key in the user's shell startup file so future runs can authenticate.

Skill content
fs.appendFileSync(rcFile, `\n# Superlore Podcast Briefings\nexport SUPERLORE_API_KEY="${apiKey}"\n`);
Recommendation

Save the key to your shell profile only if you are comfortable with that persistence. Keep file permissions tight and rotate the key if it is exposed.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

If scheduled, the skill may continue generating podcast episodes and sending workspace context on the configured cadence.

Why it was flagged

The skill supports recurring scheduled podcast generation, which is disclosed and user-confirmed but creates ongoing automated activity.

Skill content
cron: "Setup wizard outputs openclaw cron commands for scheduling. Runs them only with explicit user confirmation."
Recommendation

Confirm the exact schedule before enabling it, periodically review configured OpenClaw cron jobs, and remove schedules you no longer want.

What this means

Running the setup wizard may execute local scheduling commands, not just print instructions.

Why it was flagged

The setup script imports Node's child_process functionality, and the static scan also reported shell command execution in this file.

Skill content
const { execFileSync } = require('child_process');
Recommendation

Run the setup script only from a trusted checkout, read any commands it proposes before confirming, and add cron jobs manually if you prefer stricter control.