OpenClaw Safety Guard

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill claims to be a safety guard, but its package metadata and runnable implementation do not line up, so it should be reviewed before trusting it or giving it API keys.

Review this skill before installing or relying on it. Verify the publisher, fix the metadata mismatch, and inspect the actual safety-guard executable/source before running commands or setting real API keys. If testing, use nonsensitive inputs and limited provider credentials.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You may not be reviewing or installing the skill you think you are, or the package may have been assembled from unrelated artifacts.

Why it was flagged

The bundled metadata does not match the evaluated skill identity, which is safety-guard-skill version 1.0.1 in the registry/SKILL.md. This creates provenance and package-integrity ambiguity.

Skill content
"ownerId": "kn70pywhg0fyz996kpa8xj89s57yhv26", "slug": "summarize", "version": "1.0.0"
Recommendation

Do not rely on the skill until the publisher fixes the metadata to match the registry and release artifacts.

What this means

A user or agent could run a command whose actual implementation is not part of the reviewed package.

Why it was flagged

The skill instructs use of a safety-guard executable, but the supplied artifacts include no code files and no install spec for that executable. Running it would depend on an unreviewed local or external command.

Skill content
safety-guard "https://example.com" --model google/gemini-3-flash-preview
Recommendation

Require the package to include or clearly pin the executable source and install path before running the documented commands.

What this means

Users may develop a false sense of security and rely on a guardrail that is not verifiably present in the package.

Why it was flagged

This is a strong safety assurance, but the reviewed artifacts do not contain the implementation needed to verify that blocking behavior.

Skill content
Analyzes user input and blocks harmful content, dangerous commands, and prompt injection attacks.
Recommendation

Treat the safety claims as unverified until the implementation, tests, and install mechanism are available for review.

What this means

Those keys can authorize provider usage and potential costs if used by the CLI.

Why it was flagged

The skill asks users to configure provider API keys. This is expected for model-backed analysis, and the artifacts do not show hardcoded secrets, logging, or unrelated credential use.

Skill content
Set the API key for your chosen provider: OpenAI: `OPENAI_API_KEY` ... Anthropic: `ANTHROPIC_API_KEY` ... Google: `GEMINI_API_KEY`
Recommendation

Use limited-scope or test keys where possible and monitor provider usage, especially until the executable is reviewed.

What this means

Sensitive files or URLs could be sent to external services if the user chooses those inputs.

Why it was flagged

The documented workflow may process user-selected files, URLs, or YouTube content through model and extraction providers. The providers are disclosed, but retention and data-handling boundaries are not described.

Skill content
safety-guard "/path/to/file.pdf" --model google/gemini-3-flash-preview ... `--firecrawl auto|off|always` ... `--youtube auto` (Apify fallback if `APIFY_API_TOKEN` set)
Recommendation

Avoid testing with private documents or sensitive URLs until the data flow and provider handling are documented.