Andara Rag Search

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: andara-rag-search Version: 1.0.0 The skill provides an AI agent with the capability to execute arbitrary SQL queries via the `bash` tool and `psql` using a `$DATABASE_URL` environment variable. While the documentation in `SKILL.md` describes search-related tasks, it explicitly guides the agent to access highly sensitive data including `equity_percent`, `revenue_eur`, and `customer_emails`. The reliance on shell-based database access without input sanitization or restricted permissions represents a high-risk capability that could be easily exploited for unauthorized data access or manipulation.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If installed in an environment with DATABASE_URL set, the agent could read private business, customer, revenue, and equity information using whatever database privileges that URL grants.

Why it was flagged

The skill relies on a database connection string and documents access to customer, order, email, and equity-related data. The provided metadata declares no required env vars or primary credential, so this high-impact access is under-declared and not clearly scoped.

Skill content
psql "$DATABASE_URL" ... `team_members` ... `email`, `equity_percent`; `orders` ... `customer_name`; `customers` ... `name`, `email`
Recommendation

Declare DATABASE_URL and psql as requirements, use a least-privilege read-only database role, restrict accessible tables and columns, and require explicit user approval before returning customer, financial, or equity data.

What this means

A mistaken or manipulated query could read more data than intended, query unrelated tables, or rely on database permissions rather than the skill’s stated read-only rule.

Why it was flagged

The skill exposes raw SQL execution through bash with free-form search term substitution. The read-only limitation is documented, but not technically enforced by the artifact, and the examples do not use parameterized queries or an allowlisted search wrapper.

Skill content
Run a PostgreSQL query against the `knowledge_base` table using the `bash` tool ... Replace `SEARCH_TERM` with the relevant keyword(s). ... Never INSERT, UPDATE, or DELETE — read-only access only
Recommendation

Prefer a narrow helper or stored procedure that only performs parameterized SELECT queries against approved tables, enforces LIMITs, and redacts sensitive columns by default.

What this means

Search results could surface sensitive historical business context or misleading stored guidance if the indexed knowledge base contains outdated or poisoned records.

Why it was flagged

The skill searches persistent RAG and memory-like content, including learned lessons and policies. That is aligned with the purpose, but retrieved content may be stale, sensitive, or should not be treated as higher authority than system or user instructions.

Skill content
`knowledge_base` | RAG chunks (3,800+) ... `rag_memory_objects` | Learned lessons & policies ... Any indexed content
Recommendation

Treat retrieved RAG content as reference material, not instructions; verify important business facts; and avoid returning personal or customer data unless the user explicitly needs it.