Confidant

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: confidant Version: 1.5.3 This skill is classified as suspicious due to several high-risk capabilities and potential vulnerabilities, despite its stated purpose of secure secret handling. Key indicators include the use of `npm install -g` and `npx --yes` for external packages (`@aiconnect/confidant`, `localtunnel`) in `scripts/setup.sh` and `scripts/request-secret.sh`, posing a supply chain risk. The `--tunnel` option in `scripts/request-secret.sh` exposes a local service to the public internet via `localtunnel`, significantly increasing the attack surface. Furthermore, the `--save <path>` and `--env <varname>` options in `scripts/request-secret.sh` allow writing secrets to arbitrary file paths or setting arbitrary environment variables, which could be exploited via prompt injection against the agent to write to sensitive locations or overwrite critical environment variables, even though these are presented as features.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may receive or save API keys, passwords, or tokens that can access your accounts or services.

Why it was flagged

The skill is explicitly meant to collect and store credentials. That is purpose-aligned, but it gives the agent access to high-impact secrets.

Skill content
Use when you need sensitive information from the user (API keys, passwords, tokens) or need to save credentials to config files.
Recommendation

Use narrowly scoped, revocable credentials; confirm exactly where each secret will be saved; rotate any secret if it may have been exposed.

What this means

A changed or compromised npm package could run code on the user’s machine and handle submitted credentials.

Why it was flagged

If the expected binaries are absent, the helper auto-downloads and runs unpinned npm packages. The external Confidant CLI is not included in the reviewed files but performs the polling and saving of secrets.

Skill content
npx --yes @aiconnect/confidant "$@" ... npx --yes localtunnel --port "$PORT"
Recommendation

Prefer reviewed and pinned package versions, install manually from a trusted source, and avoid automatic npx execution for credential-handling code.

What this means

On a shared or compromised machine, a different local service could potentially receive the request flow or direct the user to an unexpected credential form.

Why it was flagged

The script trusts an already-running localhost service that answers the health check before creating the credential request. In a secret-submission workflow, the identity of the local server and any tunnel endpoint matters.

Skill content
if server_running; then
  : # Server already running
else
  ...
REQUEST_OUTPUT=$(curl -sf -X POST "http://localhost:${PORT}/requests"
Recommendation

Use a fresh, verified Confidant server instance; avoid reusing unknown localhost services or tunnels; verify the URL and port before sharing it with the user.

What this means

A user may believe the secret cannot enter history or logs, while a documented mode can expose the secret to the agent’s command output.

Why it was flagged

The broad privacy claim is weakened by the documented stdout mode. In agent runtimes, stdout may be captured in transcripts, logs, or model context.

Skill content
no chat exposure, no copy-paste, no history leaks ... Without `--service` or `--save`, the script still polls and prints the secret to stdout
Recommendation

Use `--service` or `--save` instead of stdout mode, redact tool outputs, and update the documentation to clearly warn that stdout is not history-free.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

A background Confidant server or tmux session may remain running after the secret handoff if the user or agent does not stop it.

Why it was flagged

The documented workflow intentionally starts a long-running background server/session. This is disclosed and supports human-in-the-loop secret submission, but it can persist beyond the immediate task.

Skill content
Always run Confidant inside a tmux session ... tmux new-session -d -s confidant ... confidant serve --port 3000
Recommendation

Stop the tmux session/server after use and remove any tunnel or temporary files that are no longer needed.