Openclaw Marshal
Analysis
Openclaw Marshal is presented as a local compliance auditor, but the included script advertises undisclosed active enforcement features that can quarantine skills and add runtime hooks.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Free alert layer — upgrade to openclaw-marshal-pro for active enforcement, blocking, and automated remediation.
This user-facing description frames the package as alert-only for active enforcement, but scripts/marshal.py advertises active enforcement, auto-quarantine, runtime hooks, and protection sweeps.
marshal.py enforce [--workspace PATH] marshal.py quarantine <skill> [--workspace PATH] marshal.py unquarantine <skill> [--workspace PATH] marshal.py hooks [--workspace PATH] marshal.py protect [--workspace PATH]
The script advertises high-impact workspace mutation commands that are absent from SKILL.md's documented command list and are not accompanied by visible approval or containment guidance.
auto-quarantine non-compliant skills, generate runtime hooks, apply compliance templates, and run full automated protection sweeps
Runtime hooks and automated protection sweeps are persistent or ongoing control mechanisms, but the user-facing SKILL.md only documents policy, audit, check, report, and status commands.
Source: unknown Homepage: none
The registry metadata does not provide a verifiable source or homepage, while README.md separately gives a GitHub clone command, creating a provenance gap users should verify.
