Filewave

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: filewave Version: 1.0.0 The skill demonstrates robust security practices for credential management, storing API tokens in `~/.filewave/config` with `chmod 600` permissions and truncating tokens in output (`lib/config_manager.py`). Network activity is confined to the configured FileWave UEM server, utilizing specific and relevant API endpoints (`lib/api_utils.py`, `lib/device_cache.py`, `lib/device_hierarchy.py`). Markdown documentation is clear and does not contain prompt injection attempts. However, the `lib/bulk_update_handler.py` module directly passes user-provided `DeviceName` and `EnrollmentUser` strings from a CSV file to FileWave API `PATCH` endpoints. While the skill itself does not construct malicious payloads, this direct input could be exploited as an injection vector if the FileWave UEM platform's API or UI is vulnerable to XSS or other forms of injection via these fields, classifying it as a potential vulnerability rather than intentional malice.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI05: Unexpected Code Execution
What this means

Installing the skill may run local code and prompt for credentials earlier than expected.

Why it was flagged

The documentation describes automatic post-install Python execution, while the supplied registry/install summary says there is no install spec. Because this hook collects server and API token details, the install behavior is materially under-declared.

Skill content
"The Key Point: Onboarding Runs AUTOMATICALLY During Installation" ... "onInstall": "python3 lib/onboarding.py"
Recommendation

Do not install on a production admin machine until the actual manifest/install hook is reviewed; installation behavior should be declared consistently in registry metadata.

What this means

A token used with this skill may allow broad access to managed-device inventory and device metadata changes, including production environments.

Why it was flagged

The skill requires a bearer API token that can query and mutate FileWave UEM device records and refresh the model, but the registry metadata declares no primary credential or environment-variable contract.

Skill content
"FileWave API token" ... "Authorization: Bearer <token>" ... "PATCH /filewave/api/devices/v1/devices/{id}" ... "POST /filewave/api/fwserver/update_model"
Recommendation

Use a least-privilege FileWave token, separate lab and production profiles, and ensure the skill metadata clearly declares required credentials and write permissions.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

A bad CSV or wrong profile could rename or reassign many devices before the mistake is noticed.

Why it was flagged

The documented bulk workflow can apply CSV-driven changes across many managed devices and then refresh the FileWave model so changes propagate.

Skill content
"PATCH device name" ... "PATCH enrollment user" ... "After all devices are updated, FileWave's internal model is refreshed"
Recommendation

Test with a small lab batch first, avoid --confirm for production runs, keep backups/exports of current device metadata, and verify the selected profile before running bulk updates.

What this means

Sensitive device inventory metadata may remain on the local machine for up to seven days.

Why it was flagged

The skill persistently caches device identifiers and group mappings for performance, including potentially the entire fleet.

Skill content
"7-Day TTL Cache: Stores `Device ID`, `Serial Number`, `Device UID`, and `Group` mappings" ... "warm-cache command ... index the entire fleet"
Recommendation

Use the cache only on trusted admin machines, avoid warming the cache unnecessarily, and clear local cache data when no longer needed.