Claude Code Dispatch

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is transparent about delegating work to Claude Code, but it grants a subprocess broad file-editing, shell, and credential-bearing environment access that users should review before enabling.

Install only if you intentionally want OpenClaw to delegate coding work to Claude Code with local file access. Before use, restrict Claude Code permissions, run it in a clean environment with only needed secrets, choose a narrow project workdir, and avoid enabling Bash or broad edit access unless you have reviewed the task.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Claude Code could read or modify files and run allowed shell commands in the selected working directory as part of a dispatched task.

Why it was flagged

The skill is designed to run another coding agent non-interactively with pre-approved tools, including file editing and optional Bash execution, so high-impact actions may occur without per-action user confirmation.

Skill content
The host's `~/.claude/settings.json` must pre-authorize the tools this skill will use... Without pre-authorized permissions, Claude Code will fail in non-interactive mode because it cannot prompt for approval.
Recommendation

Use a narrowly scoped work directory, keep Claude Code permissions limited, avoid broad Bash permissions, and require explicit user approval before invoking editing or shell-enabled tasks.

What this means

Secrets and account authority present in the local environment may be available to Claude Code and to any shell commands it is allowed to run.

Why it was flagged

The subprocess uses the host's authenticated Claude Code setup and receives the host environment, including possible API keys, without documented filtering or scoping.

Skill content
Claude Code must be installed and authenticated on the host machine... Claude Code inherits environment variables from the host, including any API keys loaded by `load-openclaw-env` or similar scripts.
Recommendation

Run the skill from a clean, minimal environment, avoid loading unrelated secrets, and document or restrict which credentials Claude Code is allowed to use.

What this means

Installing or using the wrong CLI package would give a local executable access to files and environment variables.

Why it was flagged

The skill depends on an external npm-installed Claude Code CLI and brew-installed jq, which is expected for the purpose but should be verified by the user.

Skill content
"install":[{"id":"claude","kind":"npm","package":"@anthropic-ai/claude-code","bins":["claude"],"label":"Install Claude Code (npm)"},{"id":"jq","kind":"brew","formula":"jq","bins":["jq"],"label":"Install jq (brew)"}]
Recommendation

Install Claude Code only from the official trusted source and verify the binary on PATH before using this skill.

What this means

Prompts and code context may be processed by Claude Code while completing delegated tasks.

Why it was flagged

The skill intentionally sends task prompts to a separate Claude Code agent that can inspect project files; this is purpose-aligned but creates a data boundary users should understand.

Skill content
Delegate coding tasks to Claude Code CLI... file editing, shell commands, multi-file debugging, code review with file access
Recommendation

Use this only for repositories and files you are comfortable exposing to Claude Code, and avoid dispatching tasks over confidential data unless your Claude Code data policy permits it.