OpenServ Agent Sdk

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (system-prompt-override); human review is required before treating this skill as clean.

This skill appears safe as documentation, but treat the examples as code that can create credentials, open a network tunnel, and mutate OpenServ workspace resources. Review the companion client skill, protect generated .env files, pin dependencies for production, and add authorization checks before deploying destructive or paid capabilities. ClawScan detected prompt-injection indicators (system-prompt-override), so this skill requires review even though the model response was benign.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may pull in additional instructions and capabilities from a companion skill when using this one.

Why it was flagged

The skill directs the user's agent to consult another skill. This is disclosed and related to OpenServ client APIs, but it expands the trusted instruction context.

Skill content
IMPORTANT - Always read the companion skill openserv-client alongside this skill
Recommendation

Review the companion openserv-client skill as well before relying on combined behavior.

What this means

Installing current npm packages means the final code executed comes from the npm supply chain, not from the skill artifact alone.

Why it was flagged

The skill instructs users to install third-party npm packages, with no pinned versions or lockfile included in the artifact set. This is expected for an SDK guide.

Skill content
npm install @openserv-labs/sdk @openserv-labs/client zod
Recommendation

Install from trusted registries, consider pinning versions, and review package provenance for production use.

What this means

The generated .env may contain an OpenServ API key, auth token, and wallet private key that can control the agent or authorize account actions.

Why it was flagged

The SDK flow creates or uses OpenServ identity material and stores credentials locally. This is disclosed and purpose-aligned, but it is sensitive authority.

Skill content
provision() ... creates or reuses a wallet, registers the agent, and writes API key and auth token into your env
Recommendation

Keep .env out of source control, restrict access to the project directory, and understand what the generated OpenServ credentials can do.

What this means

A running local agent may remain reachable through the OpenServ tunnel and respond to tasks until the process is stopped.

Why it was flagged

Running the agent can create a long-lived connection to OpenServ's proxy so the platform can reach the local agent. This is disclosed and central to the SDK's development workflow.

Skill content
Built-in Tunnel - `run()` auto-connects to `agents-proxy.openserv.ai` for local dev
Recommendation

Stop the process when not in use, use `DISABLE_TUNNEL=true` for production server-only deployments, and expose only intended capabilities.

What this means

If copied into a real agent without validation or authorization checks, callers with access to the capability could modify or delete workspace data.

Why it was flagged

The example demonstrates a capability that can delete workspace files based on capability input. It is an SDK example, but deployed agents should guard such mutations.

Skill content
await this.deleteFile({ workspaceId: action.workspace.id, fileId: args.fileId })
Recommendation

Add validation, permission checks, logging, and confirmation for destructive workspace operations.

What this means

Information sent to capabilities may be processed by the OpenServ platform or shared through workflows involving other agents.

Why it was flagged

The skill is explicitly about agents participating in platform workflows and inter-agent calls. This is expected, but it means prompts, task data, and outputs may cross agent/platform boundaries.

Skill content
it can be triggered by workflows, other agents, or paid calls
Recommendation

Avoid sending secrets or regulated data unless the OpenServ workspace, workflow, and participating agents are trusted and appropriately configured.