Openclaw Sentinel
Analysis
The skill appears to be a local, purpose-aligned security scanner; the main things to notice are its broad workspace scanning, persistent local scan/threat data, provenance gap, and strong safety claims.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Source: unknown; Homepage: none
The registry metadata does not identify a verified source or homepage, even though this is a security-sensitive scanner users may rely on.
Deep scan of all installed skills for supply chain risks... python3 {baseDir}/scripts/sentinel.py scan --workspace /path/to/workspaceThe tool is intended to inspect all installed skills under a workspace, which is appropriate for its purpose but gives it broad local read scope over those skill files.
Verify skills are safe before they touch your workspace... shows exactly what binaries, network calls, and file operations the skill will perform.
The documentation uses strong assurance language for a heuristic static scanner, which could encourage over-reliance on its SAFE/REVIEW/REJECT output.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
SENTINEL_DIR, THREAT_DB_FILE, HISTORY_FILE = ".sentinel", "threats.json", "history.json"
The scanner keeps persistent local state for threat data and scan history, and the documented threat-list import can influence later scan results.
