Back to skill
Skillv1.5.0

ClawScan security

Openclaw Health Audit · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 19, 2026, 5:48 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's files, scripts, and runtime instructions are coherent with its stated purpose (local OpenClaw health audit and conservative auto-fix); there are minor documentation inconsistencies but no obvious attempts to exfiltrate secrets or download arbitrary code.
Guidance
This skill appears to do what it says: local inspection of OpenClaw files, optional registration of a 48h health-check cron job, and conservative auto-fixes (cron/session). Before installing, consider: 1) Back up ~/.openclaw/cron/jobs.json and ~/.openclaw/.lib/session_model_state.json so you can revert changes. 2) Run the wizard and health_monitor in --dry-run first (audit_wizard.py offers this). 3) Confirm the agent/system that will execute cron job payloads (the 'agentTurn' payload instructs sending reports via Telegram/Discord) — ensure those outbound connectors and recipients are trusted because reports will contain local audit data. 4) The documentation contains a small contradiction (claims 'Does NOT send data to external servers' yet describes sending via Telegram/Discord); treat reporting as network-capable behavior originating from your configured agent, not from the Python scripts themselves. 5) If you rely on the openclaw CLI for usage-cost, ensure its stored credentials are scoped appropriately. If you want higher assurance, inspect scripts (they are included) and run them in a controlled environment before enabling auto-fix or registering the cron job.

Review Dimensions

Purpose & Capability
okThe name/description (health audit, cron/session/token checks) match what the code does: it reads ~/.openclaw files (openclaw.json, session_model_state.json, cron jobs), measures prompt file sizes, inspects message-injector/index.ts and pools/session state, and can register/modify a local cron jobs json. No unrelated credentials or cloud APIs are requested by the skill itself.
Instruction Scope
noteSKILL.md and the scripts explicitly read and (when asked) write local OpenClaw config and cron job files and run local Python scripts — that is expected. Minor inconsistency: SKILL.md's security table says 'Does NOT send data to external servers', but the cron job prompts and documentation instruct the agent to 'send the report to the user (Telegram/Discord)'. The skill itself does not directly implement network exfiltration, but scheduled agent runs or the agent that executes the cron payload can deliver reports over network connectors.
Install Mechanism
okNo network downloads or package installs. install.sh and the two Python scripts run locally; audit_wizard writes config and optionally appends a cron job to ~/.openclaw/cron/jobs.json. This is a low-risk install mechanism (no remote code fetches or archive extraction).
Credentials
okThe skill requests no environment variables and no primary credential. It invokes the local 'openclaw' CLI for usage-cost reporting (via subprocess) which is appropriate for token-trend checks; that CLI may itself rely on stored gateway credentials — this is expected for the purpose. No extraneous secrets or unrelated service credentials are requested by the skill.
Persistence & Privilege
okalways:false and default autonomous invocation are preserved. The skill writes its own config and can register a cron job under ~/.openclaw, which is appropriate for a monitoring tool. It does not modify other skills' code or system-wide settings outside the OpenClaw workspace.