Back to skill
Skillv1.0.1

ClawScan security

OpenClaw Telegram ACP Troubleshooter · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 19, 2026, 3:40 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's instructions, file references, and suggested commands are coherent with its stated purpose (diagnosing Telegram→OpenClaw delivery problems); it requests no credentials, installs no software, and only instructs reading local OpenClaw logs and service state.
Guidance
This skill appears coherent and safe in that it only advises inspecting local OpenClaw state and Telegram-related logs and does not request credentials or install code. Before using: 1) confirm you trust the agent runtime because the troubleshooting steps involve reading files under ~/.openclaw and /tmp/openclaw and running user-level systemctl commands (these logs can contain sensitive info); 2) if you are uncomfortable letting an automated agent read logs, run the listed commands yourself and share only the relevant redacted excerpts; 3) the skill forbids revealing secrets but that is a guideline in the instructions — treat it as your responsibility to avoid pasting tokens or full config dumps into external outputs; 4) because the skill is instruction-only, it won't install anything, but if you publish or mirror it into a shared workspace, ensure the workspace contains the expected OpenClaw layout so the checks make sense.

Review Dimensions

Purpose & Capability
okName/description match the runtime instructions: all checks focus on Telegram delivery, gateway health, and OpenClaw session/log inspection. The skill requests no unrelated credentials or binaries and does not attempt to modify unrelated subsystems.
Instruction Scope
okSKILL.md tells the agent to run systemctl --user and to tail/read logs and session files under ~/.openclaw and /tmp/openclaw — these actions are directly relevant to diagnosing message delivery. Note: the instructions read potentially sensitive local logs and session files (expected for troubleshooting), but they do not instruct exfiltration to external endpoints.
Install Mechanism
okInstruction-only skill with no install spec and no code files. Nothing is written to disk or downloaded by the skill itself.
Credentials
okNo environment variables, credentials, or config paths are required. The SKILL.md explicitly instructs not to reveal secret values, and there are no declared env requirements that would be disproportionate to the task.
Persistence & Privilege
okalways is false and the skill does not request persistent system presence or modify other skills. It does require the agent (when invoked) to have permission to read user-level systemd state and user files, which is appropriate for the diagnostic scope.