OpenClaw Checkpoint - Personal AI Assistant Backup & Recovery (Github)
Analysis
This backup skill is coherent in purpose, but it should be reviewed carefully because it relies on remote unpinned installer scripts, understates its file-system scope, and includes a destructive delete command while handling sensitive OpenClaw memory and GitHub access.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
curl -fsSL https://raw.githubusercontent.com/AnthonyFrancis/openclaw-checkpoint/main/scripts/install-openclaw-checkpoint.sh | bash
The installation path executes a remote script from the mutable main branch, while the reviewed package contains no helper scripts or install spec; those external scripts would control sensitive backup and restore behavior.
macOS: Creates a launchd plist at `~/Library/LaunchAgents/com.openclaw.checkpoint.plist` ... **File access scope**: The skill only reads and writes within `~/.openclaw/workspace`. It does not access files outside this directory.
The documentation claims no file access outside the workspace while also describing a scheduler write outside that directory; other artifact text also describes backing up agent folders from ~/.openclaw/agents.
rm -rf ~/.openclaw/workspace/agents
The static scan found a destructive recursive delete command in the skill documentation without an explicit confirmation gate.
macOS: Creates a launchd plist at `~/Library/LaunchAgents/com.openclaw.checkpoint.plist` - **Linux**: Adds a user-level cron job ... Auto-backup is **opt-in only**
The skill can create recurring background backup jobs under the user's account; this is disclosed as opt-in, but it is persistent behavior.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
- SSH key or GitHub Personal Access Token - A **private** GitHub repository for storing backups
GitHub authentication is expected for a GitHub backup tool, but it grants access to the repository containing the user's OpenClaw state.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Your backup contains personal data: - Agent identity and personality - Conversation history and memories - Personal notes and configurations
The skill intentionally stores and restores persistent identity, memory, and configuration data that can influence future agent behavior.
