Openclaw Security Toolkit

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: openclaw-security-toolkit Version: 1.0.0 The OpenClaw Security Toolkit is a legitimate administrative utility designed to audit configurations, scan for exposed secrets, and manage access controls for an OpenClaw installation. The codebase (scripts/audit.py, scripts/scanner.py, scripts/token.py) uses only Python standard libraries to perform local file operations within the ~/.openclaw directory. It includes security-conscious features such as secret masking for console output and provides automated hardening capabilities like token rotation. No evidence of data exfiltration, unauthorized network activity, or malicious prompt injection was found; the tool's behavior is entirely consistent with its stated purpose.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running scans or reports may expose sensitive OpenClaw credential locations and findings in the agent session or output files.

Why it was flagged

The scanner is intentionally configured to read OpenClaw config, environment, and credential locations that may contain API keys, tokens, or other sensitive account data.

Skill content
"paths": ["~/.openclaw/openclaw.json", "~/.openclaw/.env", "~/.openclaw/credentials/"]
Recommendation

Use this only in a trusted local environment, review generated output before sharing it, and avoid pasting reports with secret findings into public or untrusted places.

What this means

Using --fix may change how OpenClaw authentication works and may require a gateway restart; a mistaken run could disrupt existing access.

Why it was flagged

The hardening path can rotate authentication tokens and write changes to the OpenClaw configuration when fix mode is used.

Skill content
result = rotate_token(length=32) ... config["gateway"]["auth"]["mode"] = "token" ... with open(CONFIG_FILE, 'w') as f: json.dump(config, f, indent=2)
Recommendation

Run fix or token-rotation commands only when you intend to change authentication, and consider backing up the OpenClaw config first.

What this means

Saved reports may contain security findings or file locations that reveal where secrets are stored.

Why it was flagged

Reports are generated with secret-scan information included and can be saved to a user-specified file, creating a persistent artifact that may contain sensitive findings.

Skill content
report = generate_report(format=args.format, deep=args.deep, include_secrets=True) ... Path(args.output).write_text(output)
Recommendation

Store reports securely, delete them when no longer needed, and redact sensitive details before sharing.