OpenClaw Cost Guard (Budgets + Token-Saving Playbook)
Analysis
This skill is a coherent local cost-reporting tool that reads OpenClaw/Clawdbot session logs and does not show exfiltration, destructive actions, or hidden behavior.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
The extractor can run as a **budget check** ... `python3 {baseDir}/scripts/extract_cost.py --today --budget-usd 5` ... exits with code **2**The skill provides a local command intended for budget enforcement and optional alerting. This is disclosed and central to the purpose, but users should understand the exit-code behavior before wiring it into automation.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Prefer **session JSONL** logs ... OpenClaw: `~/.openclaw/agents/*/sessions/*.jsonl` ... Legacy/compat: `~/.clawdbot/agents/*/sessions/*.jsonl`
The skill is designed to read persistent local agent session logs. This is purpose-aligned for cost reporting, but those directories can contain private usage history.
