OpenClaw Deploy Guide
Analysis
This deployment guide is mostly coherent, but it asks users to run unverified remote installers/scripts and bypass operating-system safety warnings while setting up a persistent network-facing bot.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
curl -fsSL https://raw.githubusercontent.com/Markovmodcn/openclaw-china/main/scripts/install.sh | bash ... iwr -useb https://raw.githubusercontent.com/Markovmodcn/openclaw-china/main/scripts/install.ps1 | iex
The recommended setup fetches scripts from remote moving branches and executes them immediately; the artifacts do not show pinning, checksum verification, or signature verification.
如果提示"无法验证开发者" ... 绕过安全检查 ... Windows 已保护你的电脑 ... 点击"仍要运行"
The guide explicitly instructs users how to bypass macOS and Windows safety prompts for the installer.
webhook_port: 3000 ... security:\n allowed_users: [] # 允许的用户列表,空数组表示允许所有
The template supports a webhook/API service and documents that an empty allowed_users list permits all users.
restart: unless-stopped ... echo " 更新镜像: docker-compose pull && docker-compose up -d"
The Docker deployment is designed to keep the bot running persistently and provides an update path for replacing images.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
app_secret: your_app_secret ... github:\n token: your_github_token ... jira:\n token: your_api_token
The configuration template asks for multiple third-party secrets and access tokens for AI, messaging, GitHub, and Jira integrations.
