Clauditor

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: clauditor Version: 0.1.2 The skill bundle is a security watchdog with strong defensive features like HMAC-chained logs, UID-filtered monitoring, and detection rules for exfiltration, injection, and tampering. However, it is classified as suspicious due to a few risky capabilities and inconsistencies. The `alerter` crate (crates/alerter/src/lib.rs) includes an `AlertChannel::Command` that allows executing arbitrary commands configured in the daemon's TOML file, which, while protected by file permissions, is a powerful primitive. Additionally, the `wizard/wizard.sh` script grants the `sysaudit` user membership to the `clawdbot` group for `/proc` access, a privilege escalation for a stated purpose. There's also a discrepancy in the GitHub repository URL between `SKILL.md` and `wizard/install.sh`, and the `systemd-core-check` sentinel binary is installed by `wizard/wizard.sh` but not provided in the analyzed files, indicating a potential incompleteness or packaging issue.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

A background watchdog may remain running under a misleading systemd-like name and may be harder to identify or disable than a normally named user-installed service.

Why it was flagged

The service is intentionally persistent and uses a stealthy name resembling a system component, which can make it harder for users or administrators to notice and manage.

Skill content
Separate `sysaudit` daemon (stealth service name: `systemd-journaldd`)
Recommendation

Install only if you explicitly want a tamper-resistant watchdog; inspect the service unit and uninstall path, and consider renaming the service and log directory to transparent names.

What this means

The installed daemon can observe privileged filesystem execution signals for the target UID and depends on root-level system capabilities.

Why it was flagged

The collector requires very high local privileges and uses filesystem-level fanotify marking, which is broader than a simple per-directory watch even though it later filters events.

Skill content
//! Requires CAP_SYS_ADMIN or root. ... FAN_MARK_FILESYSTEM marks the entire filesystem at the kernel level
Recommendation

Verify the exact target_uid, watch paths, service sandboxing, and Linux capabilities before enabling it; run with the least privilege that still meets your monitoring needs.

ConcernMedium Confidence
ASI01: Agent Goal Hijack
What this means

If an agent treats this file as operative instructions, it could take actions outside the user's install or audit task.

Why it was flagged

The package includes agent-facing instructions that could redirect an agent into autonomous development, sub-agent spawning, commits, and GitHub pushes unrelated to normal end-user use.

Skill content
Every Turn (Orchestrator/Opus) ... Spawn Engineer sub-agent for current bead (via Codex `--full-auto`) ... Commit ... Push to GitHub
Recommendation

Do not let AGENTS.md override the user’s task; treat it as repository-development documentation only, or remove it from the installed skill package.

What this means

A misconfigured or tampered alert configuration could cause commands to run as the daemon user.

Why it was flagged

The alerter can execute configured commands when alerts fire; this is disclosed and purpose-aligned for alerting, but it is an automatic execution path.

Skill content
Command channel executes user-provided commands (ensure config is trusted) ... Command { command: String, args: Vec<String> }
Recommendation

Keep /etc/sysaudit/config.toml tightly permissioned, avoid the command alert channel unless necessary, and prefer syslog/file alerts for routine use.

What this means

Audit logs may reveal sensitive local activity, filenames, or operational patterns even without any evidence of network exfiltration.

Why it was flagged

The default configuration monitors a broad Clawdbot home path and persists the resulting activity to local audit logs.

Skill content
watch_paths = ["/home/clawdbot"]  # Directories to monitor ... log_path = "/var/lib/.sysd/.audit/events.log"
Recommendation

Limit watch_paths to what you need, protect log access, define retention/rotation expectations, and review digest output before sharing it.