Openclaw Genie

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a documentation-only OpenClaw reference skill; it is coherent and not malicious, but it describes powerful OpenClaw setup options that users should enable carefully.

This skill appears safe to install as a reference skill. When following its OpenClaw documentation, review command blocks before running them, avoid unneeded daemon/background operation, grant only the credentials and platform scopes you need, keep sandboxing and approvals enabled, and be careful with memory indexing or remote provider settings for sensitive data.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a user copies these commands, they may execute remote installer code and create a persistent local OpenClaw service.

Why it was flagged

The documentation shows user-directed OpenClaw installation commands that run a remote script, install the latest package, and install a daemon. This is central to the OpenClaw setup purpose, but users should verify the source before running them.

Skill content
curl -fsSL https://openclaw.ai/install.sh | bash ... npm install -g openclaw@latest ... openclaw onboard --install-daemon
Recommendation

Review the installer source, prefer pinned versions where practical, and only install the daemon if you want OpenClaw running persistently.

What this means

Misconfigured OpenClaw tools could allow an agent to run commands or affect local systems beyond a normal chat interaction.

Why it was flagged

The skill documents OpenClaw tool capabilities that can run shell commands on different hosts. This is expected for an OpenClaw tools reference, but it is high-impact if enabled without sandboxing or approvals.

Skill content
## Exec Tool

Runs shell commands with foreground/background execution. ... `host` | `sandbox` / `gateway` / `node`
Recommendation

Keep sandboxing and approval prompts enabled, use deny/allow lists, and avoid granting gateway or node execution unless you need it.

What this means

Connecting OpenClaw to messaging platforms can let the agent read messages, send messages, react, and handle files depending on the scopes granted.

Why it was flagged

The OpenClaw channel setup reference includes broad messaging and file permissions for integrations such as Slack. These permissions are purpose-aligned for messaging integrations but grant real account authority.

Skill content
Scopes: `chat:write`, `channels:history`, `channels:read`, `groups:history`, `im:history`, `app_mentions:read`, `assistant:write`, `reactions:read/write`, `files:read/write`, `commands`, + more.
Recommendation

Use least-privilege app scopes, store tokens as secrets, and restrict channel access with allowlists or pairing policies.

What this means

If enabled broadly, OpenClaw memory search may persist or index private notes, transcripts, or other local Markdown content for later agent use.

Why it was flagged

The memory reference documents optional indexing of files outside the workspace and session transcripts. This is aligned with OpenClaw memory/search features but can involve private local content.

Skill content
`extraPaths`: [],             // index Markdown outside workspace ... `sessionMemory`: false,     // index session transcripts
Recommendation

Keep `extraPaths` narrow, leave session transcript indexing off unless needed, and understand where embeddings and indexes are stored.

What this means

A user might over-assume that every OpenClaw configuration is local-only, even when enabling remote providers or third-party channels.

Why it was flagged

The privacy claim is broad. Other references document external model providers, messaging platforms, OAuth, and remote embedding/PDF processing options, so locality depends on configuration.

Skill content
All data stays local.
Recommendation

Treat local-only operation as configuration-dependent; review model, embedding, PDF, browser, and channel settings before handling sensitive data.