Openclaw Expert

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (system-prompt-override); human review is required before treating this skill as clean.

Install this skill if you want an OpenClaw administration reference. Before letting an agent apply its advice, confirm changes to config, channels, cron jobs, Docker mounts, gateway tokens, and persistent memory files, and prefer pinned/official install sources for production systems. ClawScan detected prompt-injection indicators (system-prompt-override), so this skill requires review even though the model response was benign.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If followed carelessly, configuration edits or restarts could disrupt the user’s agent or messaging setup.

Why it was flagged

The skill is meant to guide configuration changes and service restarts. This is purpose-aligned, but these are administrative actions that can affect a running OpenClaw deployment.

Skill content
Vor jeder Änderung ... Backup anlegen ... Änderung durchführen ... systemctl --user restart openclaw-gateway
Recommendation

Use the skill for requested OpenClaw administration tasks, but confirm important changes, keep backups, and validate with OpenClaw’s doctor/config tools.

What this means

A user who copies these install commands relies on the remote source being trustworthy at execution time.

Why it was flagged

The documentation includes a remote script install pattern. This is common for setup guides, but it executes code fetched at install time.

Skill content
curl -fsSL https://get.openclaw.ai | bash
Recommendation

Prefer official sources, review install scripts when possible, and pin versions for production deployments.

What this means

A local user or process could potentially see the gateway token while the command is running.

Why it was flagged

The command passes a gateway token through process arguments. The token is purpose-aligned for gateway health checks, but command-line arguments may be visible locally.

Skill content
docker compose exec openclaw-gateway node dist/index.js health --token "$OPENCLAW_GATEWAY_TOKEN"
Recommendation

Avoid putting long-lived tokens directly in argv when safer alternatives exist; rotate tokens if they may have been exposed.

What this means

Information or instructions written into workspace memory may affect future agent behavior.

Why it was flagged

The skill documents persistent workspace instructions and memory that are reused across sessions. This is central to OpenClaw, but persistent context can carry stale, sensitive, or poisoned instructions.

Skill content
AGENTS.md # Betriebsanweisungen (in JEDER Session geladen) ... MEMORY.md # Langzeit-Gedächtnis
Recommendation

Review persistent workspace files periodically and avoid storing secrets or untrusted instructions in long-term memory.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Cron jobs may spend tokens, send announcements, or take actions on a schedule if configured.

Why it was flagged

The documentation shows how to create scheduled OpenClaw jobs. This is an expected feature, but scheduled jobs persist and can run without the user actively prompting each time.

Skill content
openclaw cron add --name "Tageszusammenfassung" --cron "0 7 * * *" --message "Fasse die wichtigsten Ereignisse zusammen" --announce
Recommendation

Only create scheduled jobs intentionally, review them regularly, and disable jobs that are no longer needed.

What this means

A connected node can add capabilities such as browser or system actions depending on how it is configured.

Why it was flagged

The examples describe connecting remote nodes to a gateway using a token. This is purpose-aligned for OpenClaw nodes, but it expands the agent’s reach to other devices.

Skill content
openclaw node host --gateway wss://<vps>.your-tailnet.ts.net --token <gateway-token>
Recommendation

Approve only trusted nodes, protect gateway tokens, and restrict node capabilities to what is actually needed.