OpenClaw Security Audit

ReviewAudited by ClawScan on May 1, 2026.

Overview

This appears to be a coherent read-only local OpenClaw security audit skill, but its reports can include sensitive local configuration details.

This skill is suitable for a local OpenClaw security review. Before installing or running it, understand that it inspects local configuration, proxy files, Docker/port state, and permission metadata, and its output may contain sensitive environment details. Review and redact raw findings before sending them to others.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The audit may reveal local services, listening ports, and related system details to the agent and in the final report.

Why it was flagged

The skill invokes fixed local networking tools to collect listening-port state. This is expected for a local security audit, but it exposes system service information in the audit output.

Skill content
p = subprocess.run(["ss", "-lntup"], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, text=True, timeout=10)
Recommendation

Use it only when you intend to audit the local machine, and avoid sharing raw audit output publicly unless you have reviewed it.

What this means

If proxy configs contain tokens or Authorization headers, those values could appear in the audit transcript or report.

Why it was flagged

The proxy audit searches Nginx/Caddy configuration for credential-like markers and returns the full matching line. This is purpose-aligned for detecting leaks, but the returned line may itself contain a secret.

Skill content
"url_credential_leak": [r"token=", r"gatewayUrl=", r"key=", r"secret=", r"Authorization"] ... findings.append(f"[{risk_type}] L{i}: {line.strip()}")
Recommendation

Redact token, key, secret, and Authorization values before sharing results outside the local trusted context.