Senior Backend

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: senior-backend Version: 2.1.1 The 'senior-backend' skill bundle provides a comprehensive set of tools for backend development, including API scaffolding, database migration analysis, and performance testing. The Python scripts (api_load_tester.py, api_scaffolder.py, and database_migration_tool.py) are well-structured, use standard libraries, and lack any indicators of malicious intent such as data exfiltration, unauthorized network calls, or obfuscated code. The documentation in SKILL.md and the reference guides promote industry-standard security practices (OWASP Top 10, input validation, and secure JWT handling) and do not contain any prompt injection attempts or harmful instructions.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

Using a third-party or untrusted OpenAPI file could lead to unsafe generated backend code being added to a project.

Why it was flagged

OpenAPI schema pattern text is inserted directly into a generated TypeScript regex literal. A malicious or malformed spec could break generated code or inject unexpected TypeScript before the generated backend code is reviewed and run.

Skill content
if 'pattern' in s:
                zod += f'.regex(/{s["pattern"]}/)'
Recommendation

Only scaffold from trusted specs, review generated diffs before running or committing them, and update the generator to safely escape regex literals, quote property names, and serialize untrusted strings.

What this means

A poorly scoped load test could cause outages, rate-limit violations, or account/API abuse reports.

Why it was flagged

The load tester continuously sends requests with user-configurable concurrency for the requested duration. This is expected for load testing but can disrupt services if aimed at production or third-party endpoints.

Skill content
with ThreadPoolExecutor(max_workers=self.concurrency) as executor:
...
while not self.stop_event.is_set():
            result = client.request(self.url, self.method, self.body)
Recommendation

Run load tests only with permission, start with low concurrency, prefer staging environments, and confirm duration and target URL before execution.

What this means

If pointed at the wrong database or used with overly privileged credentials, the tool could expose schema details or enable risky migration actions.

Why it was flagged

The workflow uses database connection strings, which may carry privileged access to real application data and schema state. This is purpose-aligned for backend migration analysis but crosses an important permission boundary.

Skill content
python scripts/database_migration_tool.py --connection $DATABASE_URL --analyze
Recommendation

Use read-only credentials for analysis, use staging databases first, back up data before migrations, and avoid placing production secrets directly in shell history.

What this means

Users may have less ability to verify who maintains the scripts or compare them against an upstream project.

Why it was flagged

The package provenance is not clearly linked to a public source or homepage. This is not evidence of malicious behavior, but users have less context for trusting the included helper scripts.

Skill content
Source: unknown
Homepage: none
Recommendation

Inspect the included scripts before use and prefer pinned, auditable sources for production automation.