iDRAC

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: idrac Version: 1.1.0 The skill is designed to manage iDRAC, but it exhibits significant vulnerabilities. The `scripts/idrac.sh` file sources a user-created configuration file (`~/.config/idrac-skill/config`), which introduces a Remote Code Execution (RCE) vulnerability if an attacker can modify this file. Additionally, the script uses `curl -k` to disable TLS verification for iDRAC connections, making them susceptible to Man-in-the-Middle attacks, although this is explicitly documented in `SKILL.md` as a trade-off for self-signed certificates. While these are critical security flaws, there is no evidence of intentional malicious behavior such as data exfiltration to unauthorized endpoints or installation of backdoors.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the credential file or password-manager item is exposed or misused, someone could access the iDRAC interface for the configured server.

Why it was flagged

The skill may retrieve iDRAC credentials from a password manager and store them locally; this is expected for iDRAC administration, but the credentials can grant server management access.

Skill content
**1password** | `OP_ITEM="item-name"` | Pulls username:password via `op` CLI, caches to `~/.idrac-credentials` |
Recommendation

Use a least-privileged iDRAC account where possible, keep ~/.idrac-credentials mode 600, verify the intended 1Password item, and delete cached credentials when no longer needed.

What this means

A mistaken or poorly reviewed power action could shut down or restart a physical server.

Why it was flagged

The skill explicitly supports high-impact server management actions, but it also instructs the agent to obtain confirmation before destructive operations.

Skill content
**Destructive** (power off, restart, BIOS changes) → Confirm with user first
Recommendation

Only approve power or BIOS-changing actions when you are sure of the target server and operational impact.

What this means

On an untrusted or compromised network, credentials or results could be exposed to a man-in-the-middle attack.

Why it was flagged

The skill intentionally disables certificate verification for iDRAC HTTPS calls; this is common for self-signed management controllers but weakens protection against spoofing on untrusted networks.

Skill content
**TLS verification disabled** (`-k`) — iDRAC uses self-signed certs (acceptable for private networks)
Recommendation

Use this only on a trusted management network, or adapt the script to trust the iDRAC certificate instead of using `-k`.