Openclaw Sentry
Analysis
This is mostly a coherent local secret scanner, but the bundled script also advertises file-changing redaction, quarantine, and protection commands that are not disclosed in the main skill commands.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Usage:\n sentry.py redact [file] [--workspace PATH]\n sentry.py quarantine <file> [--workspace PATH]\n sentry.py defend [--workspace PATH]\n sentry.py protect [--workspace PATH]\n...\n# considered high-density and auto-quarantined by `protect`.
The included tool advertises commands that can modify or move workspace files, and `protect` is described as auto-quarantining files. This is broader than the SKILL.md scan/check/status workflow and is not clearly scoped there.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
def collect_files(workspace): ... for root, dirs, filenames in os.walk(workspace): ... if not is_binary(fpath): files.append(fpath) ... content = filepath.read_text(encoding="utf-8", errors="ignore")
The scanner recursively opens non-binary workspace files to inspect their contents. This is necessary for secret detection, but it means secret-bearing files enter the tool's processing and reporting path.
