clawsec-nanoclaw

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly coherent as a security monitor, but it can automatically change critical NanoClaw files and let agents approve persistent baselines, so it needs careful review before installation.

Review this skill before installing. It appears purpose-aligned for NanoClaw security monitoring, but install it only if you are comfortable giving it host-level access to protected configuration and instruction files. Consider running integrity checks in non-restoring mode first, restrict baseline approval to a human administrator, and fix or validate the snapshot naming behavior before enabling auto-restore.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A compromised or misled agent could make hostile changes to agent instructions or group configuration look approved and persistent.

Why it was flagged

The skill lets an agent approve changes to persistent instruction/configuration files as a new trusted baseline, and the documentation acknowledges that a malicious scheduled task could approve its own changes.

Skill content
`clawsec_approve_change` ... `path`: `/workspace/group/CLAUDE.md` ... `approved_by`: `agent` ... `Does NOT Protect Against: ... Malicious scheduled tasks that approve their own changes`
Recommendation

Require explicit human/admin approval for baseline changes, restrict `clawsec_approve_change` to trusted operators, and monitor audit logs for unexpected approvals.

What this means

If the baseline is stale, wrong, or poisoned, the skill can automatically overwrite legitimate changes to important bot files.

Why it was flagged

Integrity checks default to automatically restoring protected files, meaning an agent-triggered tool can mutate critical NanoClaw files by default.

Skill content
`autoRestore` (optional): `true` (default) or `false` ... `If false, drift is detected but not auto-fixed`
Recommendation

Start with `autoRestore: false`, review drift reports manually, and enable automatic restore only after verifying baseline correctness and rollback procedures.

What this means

A later restore could apply the wrong approved content across group/global instruction files, potentially corrupting agent behavior.

Why it was flagged

Approved snapshots are stored using only the file basename. The policy monitors multiple `CLAUDE.md` files, so snapshots can collide and one approved file can overwrite another's saved copy.

Skill content
const snapshot = path.join(this.approvedDir, path.basename(target.path));
fs.copyFileSync(target.path, snapshot);
Recommendation

Store snapshots using a collision-resistant name derived from the full normalized path, and test policies with duplicate filenames before enabling auto-restore.

What this means

Only someone who administers the NanoClaw deployment should install it, because it can influence host-managed files and services.

Why it was flagged

Installation requires host-level integration and write access. This is expected for a NanoClaw security monitor, but it expands the agent-facing tool surface into privileged host operations.

Skill content
Prerequisites ... `Write access to NanoClaw installation directory` ... `Add the host-side IPC handlers for ClawSec operations.`
Recommendation

Install only in environments you control, review the source before adding host imports, and limit which agents/users can invoke the privileged tools.

What this means

After installation, it will continue refreshing advisory data and may run recurring checks until you remove the integration.

Why it was flagged

The skill is intended to keep running periodically as a host service. This is disclosed and purpose-aligned, but it is persistent behavior.

Skill content
`Start the service when your host process starts` ... `setInterval(() => { advisoryCacheManager.refresh().catch(...) }, 6 * 60 * 60 * 1000);`
Recommendation

Confirm you want continuous monitoring, document the refresh/check schedule, and remove the host imports and scheduled tasks during uninstall.

What this means

Users may over-trust advisory results and skip code review or operational safeguards.

Why it was flagged

The skill makes an absolute accuracy claim about advisory results. Even curated feeds can be incomplete or mistaken, so users should not treat this as a guarantee.

Skill content
`Zero false positives (curated feed only)`
Recommendation

Treat ClawSec results as one security signal, and combine them with source review, signature verification, sandboxing, and runtime monitoring.