Openclaw Backup

ReviewAudited by ClawScan on May 10, 2026.

Overview

This looks like a legitimate local OpenClaw backup tool, but it backs up API keys and has cleanup/config handling that could delete unrelated files or run unexpected shell commands if misconfigured.

Use this only with a dedicated, private backup directory. Do not point the old-backup path at your home, documents, desktop, root, or any shared folder. Treat every backup as containing API keys and identity data, protect or encrypt it, and inspect/fix the shell config handling before relying on automated backups. Windows users should not run the referenced PowerShell scripts unless they obtain and review them separately.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone who can access the backup location may be able to read API keys or identity-related OpenClaw data.

Why it was flagged

The skill clearly discloses that it backs up OpenClaw credential files containing API keys. This is purpose-aligned for a full configuration backup, but it creates sensitive backup copies.

Skill content
| credentials/ | 凭证文件(含 API 密钥) |
...
1. credentials/ 包含敏感信息 - 妥善保管备份
Recommendation

Use a private, access-restricted or encrypted backup directory, avoid shared/cloud-synced folders unless encrypted, and rotate keys if a backup is exposed.

What this means

If the old-backup directory is set to a general folder such as a home or documents directory, cleanup could permanently delete unrelated data.

Why it was flagged

The cleanup routine deletes immediate subdirectories under the configured old-backup root without confirming they are actually backups. Because the old-backup path is configurable, a broad or mistaken path could cause unrelated folders to be removed.

Skill content
ls -tdr "$OLD_BACKUP_ROOT"/*/ | while read dir; do
    ...
    rm -rf "$dir"
    echo "[DELETED] $BASENAME"
done
Recommendation

Only use a dedicated backup directory. The maintainer should refuse dangerous paths, verify backup markers or timestamp names before deletion, add a dry-run/confirmation mode, and avoid deleting anything outside the skill’s own backup tree.

What this means

A malicious or malformed configuration value could cause commands to run when the backup script starts.

Why it was flagged

The setup script writes raw user-entered paths and numbers into config.sh as shell syntax; backup.sh later sources that file. Special characters, injected lines, or non-numeric values could turn configuration data into shell commands.

Skill content
read -p "   Enter number (press Enter for default): " keep_count
...
cat > "$config_file" << EOF
BACKUP_ROOT="$backup_root"
OLD_BACKUP_ROOT="$old_backup_root"
...
KEEP_COUNT=$keep_count
MAX_OLD_SIZE_GB=$max_old_size_gb
EOF
Recommendation

Store configuration as data rather than sourced shell, or strictly validate numeric fields and safely escape path values, for example with printf %q or a structured config format.

What this means

Windows users may need to fetch or run scripts that are not covered by this review, and ExecutionPolicy Bypass reduces PowerShell’s normal script-execution guardrails.

Why it was flagged

The documentation tells Windows users to run PowerShell scripts, but the provided file manifest only includes scripts/backup.sh and scripts/setup.sh. Those Windows scripts were not available for review in this artifact set.

Skill content
| Windows | scripts/backup.ps1 |
...
powershell -ExecutionPolicy Bypass -File "scripts/setup.ps1"
Recommendation

Include the Windows scripts in the reviewed package or remove the Windows instructions. Users should inspect any external PowerShell files before running them.