OpenClaw Sync Bridge
Analysis
The skill is mostly aligned with its stated sync purpose, but the provided code shows unsafe cloud-to-local file writing and it handles sensitive OpenClaw configuration, skills, and a GitHub token.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
local = ws / gist_name.replace("__", os.sep)
local.parent.mkdir(parents=True, exist_ok=True)
local.write_text(content, encoding='utf-8')Remote/Gist file names are converted into local paths and written without evident normalization or checks that the final path remains inside the OpenClaw workspace.
curl -fsSL https://clawhub.ai/JayShna/openclaw-sync-bridge/install.sh | bash
The documented installer pipes a remotely fetched shell script directly to the shell; the Windows instructions similarly use `irm ... | iex`.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`sync_config.json`:
```json
{
"token": "ghp_xxxxxxxx",
"gist_id": "abc123...",
"workspace": "/path/to/workspace"The skill uses a GitHub token and stores it in a local JSON configuration file for Gist access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
默认同步: - `SOUL.md` - AI 人格设定 - `AGENTS.md` - 工作区配置 - `USER.md` - 用户信息 - `IDENTITY.md` - 身份设定 - `TOOLS.md` - 工具配置 - `skills/` - 所有技能目录
The skill intentionally syncs persistent agent instructions, user/identity data, tool configuration, and all installed skills through a cloud Gist.
