Openclaw Bastion

ReviewAudited by ClawScan on May 10, 2026.

Overview

The scanner’s local prompt-injection checks are purpose-aligned, but the included script advertises under-documented file-changing and hook/enforcement commands that go beyond the alert-only description.

This looks like a local security scanner, but review the script before installing and run only the read-only scan/check/status commands at first. Avoid sanitize, quarantine, canary, enforce, or protect unless you have backups and understand exactly what persistent files or hooks they create.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

NoteHigh Confidence
ASI01: Agent Goal Hijack
What this means

Agents reviewing the documentation may see instruction-like strings, but the surrounding context clearly labels them as examples of attacks to detect.

Why it was flagged

These are prompt-injection phrases, but they are presented as detection examples in a security scanner’s documentation, so the finding is expected rather than evidence of goal hijacking.

Skill content
- **Instruction override** — "ignore previous instructions", "disregard above", "you are now", "new system prompt"
Recommendation

Keep these phrases quoted or fenced as examples, and do not treat them as instructions when reviewing or using the skill.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

If invoked, these commands could modify, move, or otherwise affect workspace files beyond simply reporting injection findings.

Why it was flagged

The script advertises file-mutating and enforcement commands, while SKILL.md mainly documents scan/check/boundary/status/allowlist workflows and says active blocking, sanitization, and runtime enforcement require a Pro upgrade.

Skill content
actively neutralizes threats — block injections, sanitize hidden Unicode, quarantine compromised files, deploy canary tokens, and enforce content policies via hooks. ... bastion.py sanitize <file|dir> ... quarantine <file> ... enforce ... protect
Recommendation

Use only scan/check/status until the mutating commands are reviewed. Require explicit user approval, backups, and clear rollback steps before running sanitize, quarantine, block, enforce, or protect.

ConcernMedium Confidence
ASI10: Rogue Agents
What this means

Running these commands could leave persistent workspace state or change how the agent/workspace is protected after the immediate scan task.

Why it was flagged

The script references persistent canary/quarantine state and enforcement/protection commands, but the SKILL.md does not clearly describe the scope, persistence, or reversal of these behaviors.

Skill content
CANARY_DIR = ".bastion" ... QUARANTINE_DIR = ".quarantine/bastion" ... bastion.py canary [file|dir] ... bastion.py enforce ... bastion.py protect
Recommendation

Do not run canary, enforce, or protect unless you have inspected the implementation and know exactly what files or hooks it creates and how to remove them.

What this means

A user installing from the README may rely on an external repository that is not declared as the registry source/homepage.

Why it was flagged

The registry lists the source as unknown and no homepage, while the README gives a manual GitHub clone command. This is not automatic execution, but it is a provenance detail users should verify.

Skill content
git clone https://github.com/AtlasPA/openclaw-bastion.git
Recommendation

Verify the repository owner, version, and contents before installing or updating from GitHub.