Warp Oz

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: oz Version: 1.1.0 The 'oz' skill bundle provides a Bash wrapper (oz-api.sh) and a Python orchestrator (orchestrator.py) for managing Warp Oz cloud agent pipelines. The scripts demonstrate security-conscious design by supporting 1Password for credential management and passing API keys via stdin to curl to prevent exposure in process logs. All functionality, including the agent role definitions in references/agent-roles.md, is consistent with the stated purpose of cloud-based task orchestration and lacks any indicators of malicious intent or data exfiltration.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone using this skill with your token can start and manage Warp Oz agent work within the token's permissions.

Why it was flagged

The skill requires a Warp API key to act against the user's Warp Oz account. This is expected for the integration, but it is delegated account authority.

Skill content
"env": ["WARP_API_KEY"] ... "Warp Oz API Bearer token (wk-*). Get from app.warp.dev → Settings → API Keys."
Recommendation

Use a dedicated or least-privileged Warp API key if available, keep it out of chat logs, and revoke it if you no longer need the skill.

What this means

A broad or mistaken prompt could launch unwanted cloud work, affect repository workflows, or consume account resources.

Why it was flagged

The wrapper exposes broad API operations for cloud agents. This is the skill's advertised purpose, but those operations can create, cancel, inspect, and manage cloud coding runs.

Skill content
`oz-api.sh` — bash wrapper covering every Oz API endpoint (runs, polls, schedules, artifacts, agents)
Recommendation

Review the exact command, environment ID, prompt, and target skill before running agent jobs, especially for repository-changing work.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Scheduled agents may run later, potentially consuming resources or changing repository state if the schedule is left enabled.

Why it was flagged

The script can create enabled cron schedules for agents. This is documented and user-invoked, but it creates activity that can continue after the initial chat.

Skill content
cmd_schedule_create() ... local prompt="" cron="" env_id="" name="" base_prompt="" enabled="true" ... api_call_verbose POST "/agent/schedules" -d "$json"
Recommendation

Create schedules only intentionally, use clear names, review schedule lists periodically, and pause or delete schedules that are no longer needed.

What this means

Incorrect, sensitive, or adversarial content from one stage could be reused by later stages or carried through a shared sandbox.

Why it was flagged

The orchestrator forwards one stage's status message and session link into the next stage's prompt. This is expected for multi-agent pipelines, but prior agent output can influence later agents.

Skill content
Summary: {prev.status_message}\nSession: {prev.session_link}\n\nContinue the work.
Recommendation

Inspect intermediate results for sensitive or suspicious content, and use isolated conversations when appropriate, such as the documented `--no-conversation` option.