Read Policy
PassAudited by ClawScan on May 1, 2026.
Overview
This is a narrow read-only helper for inspecting local OpenClaw policy records, with no evidence of writes, persistence, or data exfiltration.
This skill appears safe for its stated purpose if you want the agent to inspect local OpenClaw policy settings. Before installing, be comfortable with the agent reading policy configuration from your local Supabase database, and consider using a read-only database role or container access controls where possible.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent using this skill can query live local OpenClaw policy data through Docker.
The helper shells through Docker into PostgreSQL. This is a direct database command path, but the script only exposes fixed read-only SELECT workflows for list/get and escapes the user-supplied policy key.
docker exec -i supabase-db psql -U postgres -d postgres -t -A -c "$sql"
Install only if you intend the agent to inspect these local policy records, and review policy output before relying on it.
The skill relies on privileged local database access to read policy configuration.
The script connects as the postgres database user, which is typically privileged, although the provided commands only perform SELECT queries against the policy table.
psql -U postgres -d postgres
Prefer a read-only database role if available, and ensure the supabase-db container is the intended local OpenClaw database.
The skill may fail or behave unexpectedly if Docker or the expected Supabase container is not present.
The registry requirements do not declare Docker even though the included script calls docker exec, so the runtime dependency is under-declared.
Required binaries (all must exist): none
Verify Docker is installed and that the local supabase-db container is the one you expect before using the skill.
