Mealplan

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: mealplan Version: 3.0.0 The script `scripts/script.sh` contains a shell injection vulnerability in the `cmd_add` function, where user-provided arguments are concatenated into an `echo` command without proper quoting or sanitization. While the skill's functionality is consistent with its stated purpose of meal planning, this flaw allows for arbitrary command execution if the agent passes maliciously crafted input to the script.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the skill can run a local Bash script to manage meal-plan data.

Why it was flagged

The skill is operated through an included local shell script. This is expected for the documented command interface, but users should know the agent may run this helper when using the skill.

Skill content
scripts/script.sh add <meal calories type>
Recommendation

Use it only for meal-planning tasks and review the included script if you are uncomfortable with local command execution.

What this means

Meal entries may remain on disk and could be shown again in later use of the skill.

Why it was flagged

The skill stores meal and calorie history persistently on the local machine. This is disclosed and purpose-aligned, but meal history can reveal personal dietary or health-related information.

Skill content
Data stored in `~/.local/share/mealplan/`.
Recommendation

Avoid storing sensitive health details unless you are comfortable keeping them locally, and delete ~/.local/share/mealplan/ if you no longer want the history retained.