Abaddon

WarnAudited by ClawScan on May 10, 2026.

Overview

Abaddon is a coherent security-audit skill, but it can run nightly, inspect credential-like data, and save or send findings without clear redaction controls.

Install only if you want a persistent red-team audit mode. Before enabling the cron job, confirm where reports and Telegram alerts go, add redaction for any secret values, and review or disable the nightly job if you only want manual scans.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

API keys, tokens, or other secrets could be discovered during the scan and become part of the agent's report or context.

Why it was flagged

The skill explicitly instructs the agent to inspect credential-bearing locations and profile/config data. That matches the audit purpose, but it is high-impact local credential access and the artifacts do not clearly bound which values may be read or recorded.

Skill content
Keys in Keychain or flat files? ... Keys leaking through env vars? ... Secrets in git history? ... Hardcoded tokens in .zshrc?
Recommendation

Require explicit user approval for credential scans, declare the sensitive access clearly, and redact secret values by default.

What this means

Credential-like strings or sensitive file paths could be stored in audit memory and later exposed to users, agents, backups, or sync processes that can read that memory.

Why it was flagged

The prompt combines secret-pattern searches with instructions to save exact command output and evidence into persistent audit memory, with no redaction or retention guidance.

Skill content
Plaintext key scan: `grep -r "sk-\|xai-\|Bearer\|api_key" ~/.openclaw/workspace/ ...` ... `Full format — exact commands run, evidence captured... Save to: memory/audits/abaddon-YYYY-MM-DD.md`
Recommendation

Store only redacted findings, file paths, and line numbers; avoid saving raw secret values; protect the audit directory; and add retention or cleanup guidance.

What this means

Sensitive security findings could be posted to a chat destination with unclear membership or retention.

Why it was flagged

The scheduled job can send security findings to Telegram, an external delivery channel, but the artifacts do not define recipient validation, redaction rules, or what details may be included in alerts.

Skill content
CRITICAL findings: send immediate Telegram alert. Save technical report to memory/audits/abaddon-YYYY-MM-DD.md. Post summary with grade to Telegram Security topic.
Recommendation

Make Telegram delivery opt-in, validate the destination, and ensure alerts contain redacted summaries rather than raw secrets or detailed exploit evidence.

What this means

After setup, the agent can run the audit every night without another manual prompt.

Why it was flagged

The setup script creates an enabled nightly autonomous agent turn. This is disclosed and aligned with the stated nightly audit purpose, but it is persistent behavior.

Skill content
"enabled": True, ... "expr": "45 3 * * *", ... "wakeMode": "now", ... "payload": { "kind": "agentTurn"
Recommendation

Review `~/.openclaw/cron/jobs.json` after installation and disable or remove the Abaddon job if nightly scans are not desired.

What this means

The scan can collect detailed local environment information and command output.

Why it was flagged

The skill directs the agent to run multiple local diagnostic commands. These are expected for a security audit, but they read system, workspace, and dependency state.

Skill content
`lsof -iTCP -sTCP:LISTEN` ... `systemsetup -getremotelogin` ... `git -C ~/.openclaw/workspace log -p --all` ... `brew outdated` ... `npm outdated -g`
Recommendation

Run it only on systems you administer, and review the report for sensitive data before sharing it.

What this means

Users have less provenance information to rely on before running the setup script.

Why it was flagged

The registry metadata provides limited provenance and no formal install spec, while the artifact includes a setup script that modifies OpenClaw cron configuration.

Skill content
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill ... 1 code file(s): setup/cron-seed.sh
Recommendation

Inspect the included files before installation and prefer a version with clear source, homepage, and install metadata.