Back to skill
v1.0.0

Arc Shield

ReviewClawScan verdict for this skill. Analyzed May 1, 2026, 5:31 AM.

Analysis

Arc Shield is a coherent secret-scanning tool, but its strict blocking behavior and some advertised protections do not match the provided implementation closely enough for a security tool.

GuidanceReview this skill carefully before relying on it for production outbound-message protection. If installed, discard strict-mode stdout, check exit codes before sending, treat reports as sensitive, and verify that the protections you need, especially wallet mnemonic detection, are actually implemented and tested.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Tool Misuse and Exploitation
SeverityHighConfidenceHighStatusConcern
scripts/arc-shield.sh
elif [[ "$MODE" == "strict" ]]; then
        echo "$INPUT"
        if [[ $FOUND_CRITICAL -gt 0 ]]; then

Strict mode is the mode users are told to use before external messaging, but this code prints the original unsanitized input before handling critical findings.

User impactIf an agent or wrapper pipes strict-mode stdout to a messenger, log, or downstream command, a secret could still be emitted even though the command later fails.
RecommendationChange strict mode to suppress stdout when critical findings exist, or emit only redacted output; wrappers should discard stdout and check the exit code before sending anything.
Human-Agent Trust Exploitation
SeverityMediumConfidenceMediumStatusConcern
scripts/arc-shield.sh
detect_mnemonics() {
    # 12 or 24 word phrases (simplified detection)
...
# Main detection
main() {
    # Run all detectors
    local findings_1pass=$(detect_1password_tokens)
    ...
    local findings_cc=$(detect_credit_cards)

A mnemonic detector is defined, but the visible main detection/report flow does not invoke or report mnemonic findings, despite the documentation advertising wallet mnemonic blocking.

User impactUsers may believe wallet recovery phrases are blocked when the active scan path may not actually check them, creating a false sense of protection.
RecommendationWire mnemonic detection into the main scan and test suite, or remove/qualify the wallet-mnemonic protection claim until it is supported.
Agentic Supply Chain Vulnerabilities
SeverityLowConfidenceHighStatusNote
metadata
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.

The registry metadata gives no provenance or automated install contract, while the documentation includes executable scripts and clone/chmod setup steps.

User impactUsers need to verify the actual repository and files before installing or running the helper scripts.
RecommendationPublish a clear source URL, declare required binaries such as bash and python3 in metadata, and provide a reviewed install specification or checksumed bundle.
Tool Misuse and Exploitation
SeverityLowConfidenceHighStatusNote
INSTALLATION.md
rm -rf ~/.openclaw/workspace/skills/arc-shield

This is a destructive shell command, but it is documented as an uninstall step scoped to this skill's own directory and is not shown as automatic execution.

User impactRunning the command deletes the local Arc Shield skill directory.
RecommendationConfirm the path before running uninstall commands; the publisher could add an explicit confirmation or safer uninstall wording.
Sensitive data protection

Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.

Memory and Context Poisoning
SeverityMediumConfidenceHighStatusNote
scripts/arc-shield.sh
echo -e "${color}[${severity}]${NC} ${category}" >&2
...
echo "  → ${match}" >&2

The scanner reports matched secret snippets to stderr, which is useful for local review but can make reports or captured logs sensitive.

User impactBlocked-message diagnostics may still contain parts of secrets or PII if stderr/report output is saved or shared.
RecommendationTreat arc-shield reports and stderr as sensitive, prefer redacted logging, and consider masking match values in reports by default.