Openclaw Prompt Shield

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a local, purpose-aligned prompt-injection scanner with expected caller-directed file reading and report writing.

This skill looks appropriate for local prompt-injection screening. Before installing, note that it reads text from files you provide and can write reports or sanitized copies to paths you choose; keep those paths scoped and do not treat its pattern-based verdicts as a complete security guarantee.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If directed to the wrong output path, the skill could overwrite or create local files the process can access.

Why it was flagged

The sanitizer can create directories and write a sanitized copy to a caller-supplied path. This is disclosed and aligned with the skill's purpose, but it is still local file mutation.

Skill content
out_path.parent.mkdir(parents=True, exist_ok=True)
    out_path.write_text(safe_body, encoding="utf-8")
Recommendation

Use explicit, non-sensitive input and output paths, and avoid pointing output at important existing files.

What this means

Users have less independent provenance context beyond the packaged artifacts reviewed here.

Why it was flagged

The registry listing does not provide an independent source repository or provenance source. The bundled code is coherent with the stated purpose, so this is a provenance note rather than a behavioral concern.

Skill content
Source: unknown
Recommendation

Install only if you trust the ClawHub package source and consider reviewing the bundled scripts before use.