Self Updater

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This updater is purpose-aligned, but it asks users to run an absent PowerShell updater that can automatically change OpenClaw core and installed skills, including unattended approval.

Install only if you are comfortable with an updater changing OpenClaw core, installed skills, and the gateway. Before enabling AutoUpdate, AutoApprove, Quiet, or cron use, obtain and inspect the missing self-updater.ps1 script from a trusted repository, run check-only mode first, back up your OpenClaw configuration, and use limited notification credentials.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You cannot verify from the packaged artifacts what code would actually perform the updates, restarts, notifications, or approval checks.

Why it was flagged

The skill's core behavior depends on a PowerShell script referenced in SKILL.md, but that script is not included in the reviewed package. Because the missing implementation would update OpenClaw core and installed skills, this is a material provenance and reviewability gap.

Skill content
No install spec — this is an instruction-only skill. ... No code files present — this is an instruction-only skill. ... File manifest: README.md, SKILL.md
Recommendation

Do not run the updater until you have obtained and reviewed the referenced script from a trusted source, verified its checksum or repository provenance, and confirmed it only performs the intended update actions.

What this means

A scheduled run could update core components or skills and restart the gateway without you seeing or approving each high-risk change.

Why it was flagged

The documented unattended path uses AutoApprove and Quiet for scheduled updates. The same artifact says the skill updates both OpenClaw core and installed skills and can restart the gateway, so this can materially change the agent environment without interactive review.

Skill content
# Full automation (for cron)
powershell -ExecutionPolicy Bypass -File scripts/self-updater.ps1 -AutoUpdate -SmartTiming -AutoApprove -Quiet
Recommendation

Use check-only mode first, avoid AutoApprove/Quiet unless you fully trust the implementation, keep backups, and require manual approval for core, gateway, or bulk skill updates.

What this means

If the referenced script is replaced or obtained from an untrusted source, it could run with your local user privileges.

Why it was flagged

Running a local PowerShell script is central to an updater, but ExecutionPolicy Bypass lowers local script-execution restrictions and should only be used with trusted, reviewed scripts.

Skill content
powershell -ExecutionPolicy Bypass -File scripts/self-updater.ps1
Recommendation

Run only a known-good script from a trusted path, inspect it before use, and avoid bypassing execution policy unless necessary.

What this means

If these environment variables are exposed or over-privileged, someone could misuse the associated bot or app integration.

Why it was flagged

Notification credentials are purpose-aligned for Telegram/Feishu alerts, but they are still credentials that grant access to external messaging integrations.

Skill content
optional_envs:
  - TELEGRAM_BOT_TOKEN
  - FEISHU_APP_ID
  - FEISHU_APP_SECRET
Recommendation

Use least-privilege notification credentials, configure them only if notifications are needed, and rotate them if they may have been exposed.

What this means

Local schedule/config data may reveal workflow timing and can influence updater behavior if the files are inaccurate or modified.

Why it was flagged

The skill intentionally reads persistent local configuration and cron schedule data to decide update timing. This is aligned with the stated cron-aware purpose, but the cron file becomes trusted context that affects when updates run.

Skill content
Reads: `~/.openclaw/openclaw.json` (port only), `~/.openclaw/cron/jobs.json`
Recommendation

Ensure OpenClaw config and cron files are readable only by trusted users and review them before enabling unattended smart-timing updates.