Setup

PassAudited by ClawScan on May 1, 2026.

Overview

This is an instruction-only setup guide with no hidden code, but it documents powerful options such as unrestricted commands, persistent automation, credentials, and memory/email indexing that users should enable deliberately.

Use this skill as a reference, not as a config to copy wholesale. Before installing or applying its examples, decide whether you really need full exec, all tools, browser automation, daemon/heartbeat/cron, remote gateway access, Gmail body processing, or memory/session indexing. Prefer allowlists, sandboxing, token auth, env-var secrets, local/private memory options, and OpenClaw doctor checks.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied without care, the agent could be allowed to run arbitrary local commands or use broad tools on the user's machine.

Why it was flagged

The guide includes recommended configurations that can enable all tools and unrestricted command execution. This is disclosed and purpose-aligned for personal/developer setups, but it is high-impact.

Skill content
"tools": { "profile": "full", "exec": { "security": "full" } }
Recommendation

Prefer allowlisted exec, sandbox mode, and per-user allowlists unless you intentionally want full local control.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

OpenClaw may continue running as a background service after setup, especially when combined with heartbeat or cron options.

Why it was flagged

The setup checklist directs the user to install the OpenClaw daemon. This is an expected setup step, but it creates persistent background capability.

Skill content
openclaw onboard --install-daemon  # Full wizard
Recommendation

Install the daemon only if you want persistent operation, and review heartbeat/cron settings after onboarding.

What this means

Private notes or past conversations could be embedded, searched, and reused in future agent context if these options are enabled.

Why it was flagged

The memory guidance can index long-term memory files, past sessions, and local notes for later retrieval. This is expected for memory search, but it can include private or stale content.

Skill content
"sources": ["memory", "sessions"] ... "paths": [{ "path": "~/notes", "pattern": "**/*.md" }]
Recommendation

Limit indexed paths and sources, disable session indexing or auto-capture when not needed, and consider local embeddings for sensitive data.

What this means

Email or webhook content could influence agent behavior or be sent to a configured model provider if enabled.

Why it was flagged

The automation examples can route external email content into model processing. This is disclosed integration behavior, but email bodies may contain sensitive or untrusted content.

Skill content
"gmail": { "account": "your@gmail.com", "label": "INBOX", "includeBody": true, "maxBytes": 50000, "model": "anthropic/claude-haiku" }
Recommendation

Use webhook tokens, restrict labels/sources, keep body limits low, and treat inbound email or webhook text as untrusted.

What this means

A misconfigured token or broad allowlist could give unintended users access to the bot or connected accounts.

Why it was flagged

Channel setup requires bot or app credentials and user allowlists. This is expected for messaging integrations and the security guide recommends allowlists and env vars.

Skill content
"botToken": "YOUR_BOT_TOKEN" ... "allowFrom": ["YOUR_USER_ID"]
Recommendation

Store secrets in environment variables, use least-privilege tokens, and keep allowlists limited to trusted user IDs.