Agent Security Framework

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill is far broader than its security-hardening description and bundles exposed credentials, undeclared account automation, and persistent multi-agent workflows.

Do not run this skill as-is on a real machine or account. If you need to inspect it, use a disposable sandbox, do not provide personal credentials, rotate any exposed tokens, and require the publisher to remove secrets, pin install sources, trim unrelated automation, and add explicit approval gates for all external actions.

Findings (8)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An installed agent may follow this repository's internal operating rules instead of staying scoped to the user's security task.

Why it was flagged

A root agent-instruction file tells an agent to prioritize repository-local task and memory files before anything else and suppresses permission-seeking, which can redirect behavior away from the user's immediate request.

Skill content
Before doing anything else: ... Read `MISSION-CONTROL-GUIDE.md` — your tasks are here, NOT in Jira ... Don't ask permission. Just do it.
Recommendation

Remove or quarantine broad root agent instructions from the skill package, or clearly mark them as documentation that must not override user intent.

What this means

The agent could change repositories or other shared systems without a clear user approval step.

Why it was flagged

Committing and pushing changes mutates remote state and leaves the machine, yet the instruction explicitly allows it without asking.

Skill content
Proactive work you can do without asking: ... Commit and push your own changes
Recommendation

Require explicit user confirmation for all remote writes, public posts, ticket updates, pushes, and other account mutations.

What this means

Anyone with the package may be able to abuse exposed bot credentials or trigger messages under an account the user did not authorize.

Why it was flagged

The script embeds a Telegram bot token and sends to a fixed chat ID; Telegram credentials are not declared in the registry metadata.

Skill content
curl -s -X POST "https://api.telegram.org/bot8319192848:AAFM.../sendMessage"
Recommendation

Rotate exposed tokens, remove all secrets from source, declare required credentials, and require user-provided credentials through a scoped secret store.

What this means

Running the setup could apply unreviewed host changes from whatever code is current at the repository URL.

Why it was flagged

The installation guidance runs a host-modifying shell script from an unpinned external repository, while the registry source is unknown and there is no formal install spec.

Skill content
git clone https://github.com/jeffvsutherland/agent-security-framework.git ... bash security-tools/harden-host.sh
Recommendation

Pin the source to a reviewed commit, include the referenced scripts in the packaged artifact, and document exactly what host changes the script makes.

What this means

If reachable with attacker-controlled text, this pattern can turn spoken/text input into shell execution risk.

Why it was flagged

A voice/Ray-Ban bridge component interpolates text into a shell command, and that component is unrelated to the advertised security-hardening skill.

Skill content
exec(`say "${text}"`);
Recommendation

Remove unrelated bridge components from the skill or replace shell interpolation with safe argument-based APIs.

What this means

Private context can be retained, reused, or poisoned across future agent sessions unless the user understands and controls the memory boundary.

Why it was flagged

The package defines persistent memory files and gives agents broad read/write access to them, including personal context that persists across sessions.

Skill content
Daily notes: `memory/YYYY-MM-DD.md` ... Long-term: `MEMORY.md` ... You can read, edit, and update MEMORY.md freely
Recommendation

Make memory use opt-in, scope it to the specific security task, exclude private files by default, and document retention and deletion controls.

What this means

Users may trust the skill with secrets because it claims strong credential handling, while the artifact evidence shows the opposite.

Why it was flagged

The skill makes strong credential-safety claims, but provided artifacts include hardcoded tokens and static-scan secret findings.

Skill content
Credential Vault ... No plain-text credentials ... Credential Vault | OpenClaw keychain, no plain-text | ✅ Complete
Recommendation

Remove or soften unsupported security claims until the package is secret-free, audited, and aligned with the declared credential model.

What this means

The skill could encourage persistent automation that keeps acting after the user expected a one-time security task.

Why it was flagged

The artifacts describe always-on scheduled automation and background assistant behavior, not just user-invoked security checks.

Skill content
Local Cron Jobs - 5 automated tasks running daily/weekly ... You now have a true executive assistant that never sleeps
Recommendation

Separate background-agent products from this skill, disable persistence by default, and require explicit setup, scope, and uninstall instructions for any scheduler or heartbeat.