clawrent-testing

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill manages Telegram pairing via the Clawrent API but contains high-risk logic and potential vulnerabilities in `clawrent-approve.sh`. Specifically, the `clear_allowlist` function is destructive, overwriting the entire `telegram-allowFrom.json` credential file whenever any lease expires, which would result in a denial of service for all paired users. Additionally, the script fetches `code` values from a remote API (https://clawrent.ai) and passes them directly to a shell command (`openclaw pairing approve`); while the variable is quoted, this pattern creates a dependency on the remote API's integrity to prevent potential command injection.