Back to skill
Skillv1.0.0

ClawScan security

Conflict Coordination · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

ReviewMar 15, 2026, 11:14 AM
Verdict
Review
Confidence
medium
Model
gpt-5-mini
Summary
The skill's behavior mostly matches its description (detecting crontab/systemd/script/log issues) but it assumes undocumented platform-specific artifacts and sends reports to a hard-coded external messaging target — those mismatches are concerning and should be clarified before install.
Guidance
Before installing or running this skill: 1) Treat it as designed for a specific OpenClaw environment — verify /home/admin/.openclaw/workspace and scripts/task-utils.sh exist and are trustworthy. 2) Inspect and, preferably, modify scripts/detect-conflicts.sh to: make WORKSPACE and messaging target configurable (via env vars), remove or redact any sensitive fields from the report, and avoid hard-coded recipient IDs. 3) Confirm what the 'openclaw message send --channel feishu' command does in your environment and whether the recipient 'user:g68578ee' is internal/trusted; if not, disable the push or change to an approved endpoint. 4) Run the script in a safe test environment (non-production user) to observe exactly what files and data it reads and what it posts. 5) Ask the maintainer for explicit documentation of required runtime dependencies/credentials; if they cannot justify them, do not deploy to sensitive systems.

Review Dimensions

Purpose & Capability
concernThe script implements the stated detection capabilities (crontab, systemd, script overlap, logs, docs). However it assumes a specific OpenClaw runtime layout (/home/admin/.openclaw/workspace), sources task-utils.sh from that workspace, and uses an openclaw CLI call; none of those platform-specific requirements are declared in the skill metadata. That mismatch (undocumented required files/paths/CLI) is disproportionate to the SKILL.md/runtime claim of a simple detection utility.
Instruction Scope
concernSKILL.md instructs running the included detect-conflicts.sh, which reads the user's crontab, queries systemctl --user, enumerates files under /home/admin/.openclaw/workspace, writes a report into that workspace, and then calls 'openclaw message send' to push the report. Those actions go beyond passive checks: they access local configuration and workspace data and actively send a report to a fixed recipient. The SKILL.md does not warn users about what data will be collected or transmitted, nor provide configuration to change the messaging target or redact sensitive info.
Install Mechanism
okNo install spec (instruction-only plus a script) — nothing is downloaded or written at install time beyond the included files. This is low-risk from an installation/download perspective.
Credentials
concernThe skill declares no required env vars or config paths but the script depends on several environment-specific artifacts: a fixed WORKSPACE path (/home/admin/.openclaw/workspace), a sourced helper script (task-utils.sh), and an openclaw CLI capable of sending Feishu messages. It also hard-codes a Feishu recipient ('user:g68578ee'). These undeclared dependencies and implicit use of messaging credentials are disproportionate and may leak sensitive system state if the messaging endpoint is external or untrusted.
Persistence & Privilege
notealways:false and no system-wide configuration changes are requested. The script writes reports into the workspace, which is expected for a monitoring tool. However, because the skill can be invoked autonomously (default) and its runtime triggers include cron/inotify, the combination of autonomous invocation plus the hard-coded message send increases potential blast radius if the messaging integration is misconfigured.