OpenClaw Setup on AWS (Free Tier) - Memory Upgrade
Analysis
The setup guide is coherent, but it asks an agent to control a cloud server, handle multiple secrets, and deploy a persistent assistant with broad account access.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Collect what you need from them (API keys, preferences), then SSH into their server and run everything. ... sudo apt update && sudo apt upgrade -y ... echo '/swapfile none swap sw 0 0' | sudo tee -a /etc/fstab
The agent is instructed to perform broad privileged server operations, including persistent OS configuration changes, rather than only guiding the user through them.
curl -fsSL https://deb.nodesource.com/setup_22.x | sudo -E bash - ... npm install -g openclaw ... git clone https://github.com/steipete/gogcli.git
The setup relies on unpinned remote scripts, global packages, and source builds without checksum or version verification.
Can access and control your apps and services ... Calendar management (create, modify, conflict resolution) ... Drive integration (search, organize, share) ... Handles repetitive tasks automatically
The assistant may automate changes across connected services, including calendar and Drive sharing, without clear per-action approval or containment boundaries.
Anthropic API Key ... Groq API Key ... Google Workspace Integration ... Your data stays on your server. Your AI works for you. Nobody else has access.
The guide makes a broad privacy claim while also describing external AI providers and Google Workspace integrations that may process user data.
runs 24/7 on your infrastructure ... Sub-Agents: Background task workers for long-running projects ... Auto-restart on crashes (systemd service)
The assistant is designed for persistent autonomous operation, including background workers and auto-restart behavior.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Ask the user for ... AWS account access ... Anthropic API key ... Groq API key ... OpenAI API key ... Google Workspace account ... "Send me the bot token. I'll configure it now."
The skill requests multiple sensitive account credentials and tokens, including cloud, LLM, bot, and optional Google Workspace access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Persistent conversation history across sessions ... Automatic categorization of important information ... Searchable knowledge base of past interactions ... Daily notes system with automatic summary generation
The assistant is designed to retain and reuse personal context over time, but the artifacts do not clearly define retention limits, exclusions, review controls, or how poisoned/incorrect memories are handled.
