OpenClaw Use Case Catalog

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: openclaw-usecase-catalog Version: 1.0.0 The skill instructs the OpenClaw agent to perform web searches, write to the local file system (`findings/YYYY-MM-DD.md`), and execute `git add`, `git commit`, and `git push` commands to a remote GitHub repository (SKILL.md). This grants the agent powerful capabilities, including arbitrary shell command execution and network access, which are high-risk. The agent is also instructed to process untrusted content from web searches, creating a significant prompt injection vulnerability that could lead to unauthorized command execution (RCE) or data exfiltration via the `git push` mechanism. The `findings/` files further illustrate the agent's expected capabilities, including SSH access, browser automation with AppleScript, and interaction with sensitive systems, highlighting the broad attack surface and potential for abuse, even if the current intent is benign.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI08: Cascading Failures
What this means

A simple request for use-case inspiration could cause new content to be committed and pushed externally, including mistakes, private context, or untrusted web material.

Why it was flagged

This makes unreviewed new findings propagate from web research into local files and then a remote Git repository as part of the default workflow.

Skill content
After each invocation that discovers new use cases, append to (or create) `findings/YYYY-MM-DD.md`... Then commit and push: `git add findings/ && git commit -m "findings: YYYY-MM-DD" && git push`
Recommendation

Require explicit user approval before writing findings or running `git push`; show a diff first and let the user choose the repository, branch, and visibility.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

The agent may mutate a GitHub repository using the user's account authority without the user realizing that account credentials are involved.

Why it was flagged

Pushing to GitHub typically uses the user's local Git credentials or SSH keys, but the skill metadata declares no credential requirement or scope.

Skill content
Git commit and push to `{github_org}/openclaw-skill-usecases`
Recommendation

Declare the GitHub credential requirement, use a dedicated bot or deploy key with limited repository scope, and require confirmation before any push.

What this means

A user or agent could treat this as endorsed implementation guidance for social-media automation that bypasses platform protections and risks account abuse or policy violations.

Why it was flagged

The catalog is intended as inspiration for users, and this entry explicitly presents logged-in browser automation as a way to evade platform bot-detection.

Skill content
AppleScript controls real logged-in Chrome (not headless) to bypass Reddit's `navigator.webdriver=true` detection.
Recommendation

Remove or clearly quarantine anti-detection tactics; frame social-media automation examples around platform-approved APIs, rate limits, and human review.

What this means

Incorrect, untrusted, or sensitive material can become persistent context and influence future recommendations.

Why it was flagged

The skill builds a persistent knowledge base from web and social sources, then reuses it in later answers.

Skill content
Reference the catalog below and `findings/` directory for past discoveries; Search the web for fresh examples... Save new findings to `findings/YYYY-MM-DD.md`
Recommendation

Label web findings as untrusted, avoid storing private user details, and review or sanitize entries before reusing or publishing them.