Clawon

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Clawon is a coherent backup tool, but it can back up or restore highly sensitive workspace data, including sessions and credentials, and its documentation gives conflicting guidance about whether credentials are excluded.

Review this skill carefully before installing. Use discovery first, do not enable --include-secrets or --include-sessions unless you understand exactly what will be captured, prefer encrypted local backups for sensitive data, verify the npm package/source, and be cautious with restore and scheduled-backup commands because they can change your workspace or keep running via cron.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI06: Memory and Context Poisoning
High
What this means

A backup could contain private conversations, memory, API keys, tokens, or auth files, and cloud mode could send that data to Clawon servers.

Why it was flagged

The skill can include chat history, credentials, auth files, and workspace memory/config in backups, including cloud backups. That is purpose-aligned for a backup tool, but it is high-impact sensitive data access and the artifacts do not clearly define exactly which auth files are included or how cloud copies are retained.

Skill content
npx clawon local backup --include-sessions   # Include chat history
npx clawon local backup --include-secrets     # Include credentials and auth files
...
4. **Cloud backup** — sync workspace to Clawon servers
Recommendation

Run discovery and secret scanning first, avoid --include-secrets and --include-sessions unless strictly necessary, prefer encryption, and review exactly what will be backed up before using cloud sync.

#
ASI09: Human-Agent Trust Exploitation
Medium
What this means

A user may believe credentials cannot be included even though the skill documents commands that include credentials and auth files.

Why it was flagged

The documentation simultaneously says credentials can be included with --include-secrets and that credentials are always excluded. This inconsistent privacy wording could lead a user to underestimate the risk of backing up credentials.

Skill content
npx clawon discover --include-secrets   # Also show credentials and auth files
...
Credentials are **always excluded**.
Recommendation

Clarify whether credentials are excluded by default only, and require explicit user confirmation before any command that includes secrets or auth files.

#
ASI04: Agentic Supply Chain Vulnerabilities
Low
What this means

The code that performs backups and restores comes from the npm package at runtime or install time.

Why it was flagged

The skill depends on an external npm CLI rather than bundled reviewed code. This is central to the purpose and disclosed, and the skill provides verification guidance, so it is a supply-chain note rather than a standalone concern.

Skill content
All commands run via `npx clawon`.
...
Install locally (preferred over npx for auditing): `npm install -g clawon`
Recommendation

Verify the npm package and repository, consider installing a reviewed version locally, and avoid running high-impact commands through an unverified package.

#
ASI10: Rogue Agents
Low
What this means

Backups may continue running after setup until the schedule is disabled.

Why it was flagged

Scheduled backups create persistent cron entries. The persistence is disclosed and removal instructions are provided, so this is expected for scheduled backups.

Skill content
Scheduling writes an entry to your user crontab — this is a persistent change to your system. The user can review cron entries with `crontab -l` and remove them with `npx clawon local schedule off`
Recommendation

Only enable scheduling intentionally, review crontab entries, and disable the schedule when it is no longer needed.

#
ASI03: Identity and Privilege Abuse
Low
What this means

The skill may use a Clawon account credential to access cloud backup features.

Why it was flagged

Cloud backups require a Clawon API key. This credential use is expected for the cloud-backup feature, and the instructions warn that inline keys may appear in shell history.

Skill content
export CLAWON_API_KEY=<your-key>
npx clawon login
...
npx clawon login --api-key <your-key>
Recommendation

Use the environment-variable login method, protect the API key, and rotate it if it is exposed in shell history or logs.