Safe Exec.Bak
Analysis
SafeExec is mostly coherent as a local command-safety wrapper, but its approval path can execute pending shell commands without an interactive human check in agent mode, and its install/provenance metadata is inconsistent.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
if [[ -n "$OPENCLAW_AGENT_CALL" ]] || [[ -n "$SAFE_EXEC_AUTO_CONFIRM" ]]; then
IS_INTERACTIVE=false
fi
...
echo "🤖 非交互式环境 - 自动跳过确认"
...
eval "$COMMAND"The approval helper disables interactive confirmation when called in agent/auto-confirm mode and then executes the stored command via eval.
Context-aware risk assessment: Detect user confirmation keywords ... HIGH + confirmation → LOW (direct execution)
The documented design allows contextual confirmation words to downgrade high-risk commands to direct execution rather than requiring a separate approval step.
"install": [{ "id": "git", "kind": "git", "url": "https://github.com/OTTTTTO/safe-exec.git" }]The skill advertises a GitHub install path even though the registry metadata says there is no install spec and the source is unknown; the bundled _meta.json also differs from the evaluated registry identity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Requests stored in: `~/.openclaw/safe-exec/pending/` ... Audit log: `~/.openclaw/safe-exec-audit.log`
The skill persistently stores pending command requests and audit logs containing command activity.
