suspicious.prompt_injection_instructions
- Location
- SKILL.md:33
- Finding
- Prompt-injection style instruction pattern detected.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.prompt_injection_instructions
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Users need to verify the included installer and rules file themselves before trusting it to modify Guardian behavior.
The registry metadata has limited provenance and no install spec even though a shell installer is included and documented.
Source: unknown; Homepage: none; Install specifications: No install spec — this is an instruction-only skill; Code file presence: install.sh
Confirm the intended repository/source, inspect install.sh and the rules JSON, and verify local requirements before running the installer.
Running the script can modify files in the user's OpenClaw configuration.
The skill asks the user to execute a local shell script. The provided script is purpose-aligned, but it runs with the user's local permissions.
# Step 3: Run the install script cd ~/.openclaw/workspace/skills/rules-of-the-claw bash install.sh
Run the installer only after reviewing it, and execute it manually rather than letting an agent run it without confirmation.
Future OpenClaw/Guardian sessions may block commands according to this ruleset until the file is edited or restored from backup.
The installer replaces Guardian's rules file, creating persistent enforcement rules that affect future agent tool use.
GUARDIAN_DIR="${HOME}/.openclaw/extensions/guardian"
RULES_FILE="${GUARDIAN_DIR}/guardian-rules.json"
...
cp "${SOURCE_RULES}" "${RULES_FILE}"Review the installed rules, customize placeholders such as YOUR_APP/YOUR_ORG, and keep the generated backup if you may need to roll back.