Openclaw Bastion
Analysis
This looks like a local prompt-injection scanner, but its code advertises under-documented file-changing and hook/enforcement commands that users should review before installing.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
actively neutralizes threats — block injections, sanitize hidden Unicode, quarantine compromised files, deploy canary tokens, and enforce content policies via hooks
The runnable script advertises active file-changing and enforcement capabilities that are not presented in the main SKILL.md command list and conflict with the alert-layer framing.
bastion.py canary [file|dir] ... bastion.py enforce ... bastion.py protect
The script usage advertises canary and hook-style enforcement/protection commands, implying persistent workspace changes or future runtime behavior without clear scoping or removal instructions in SKILL.md.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
".env", ".conf", ".rst", ".tex",
The scanner treats .env and configuration-style files as scannable text; combined with SKILL.md's default whole-workspace scan, this may read files that commonly contain secrets.
