Secret Manager

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill fits its secret-management purpose, but it handles powerful credentials and session cookies in ways that can expose or persist them without enough warning or scoping.

Review this skill carefully before installing. It may be useful for OpenClaw secret setup, but use the interactive prompt instead of direct command-line values, confirm the OpenClaw config directory permissions, avoid storing browser session cookies unless absolutely necessary, and inspect the env file before allowing it to be sourced.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If these credentials are mishandled, a local user or process could gain access to linked third-party accounts or services.

Why it was flagged

The script supports storing account session cookies and OAuth/client secrets, not only ordinary API keys; these credentials can grant account-level access and are broader than the skill's API-key framing.

Skill content
[LINKEDIN_LI_AT]="LinkedIn li_at Cookie"
[LINKEDIN_JSESSIONID]="LinkedIn JSESSIONID"
[GOOGLE_OAUTH_CLIENT_SECRET]="Google OAuth Client Secret"
Recommendation

Only store credentials that are truly needed, avoid session cookies unless explicitly required, and clearly declare the credential types and scopes in the skill metadata and user documentation.

What this means

Secrets may be exposed through normal config-file access, backups, sync tools, or other processes that can read the OpenClaw configuration directory.

Why it was flagged

The script writes the raw credential value into auth-profiles.json outside the keyring. That may be needed for OpenClaw integration, but it is not clearly framed as plaintext persistence.

Skill content
data['profiles'][profile_id]['key'] = value
with open(path, 'w') as f:
    json.dump(data, f, indent=2)
Recommendation

Warn users that secrets are written to auth-profiles.json, ensure strict file permissions, and prefer keyring references or safer scoped credential injection where possible.

What this means

A user following the documented example could accidentally leave a token in local command history or process-monitoring logs.

Why it was flagged

The skill presents itself as a secure secret manager but documents passing secrets directly on the command line, which can expose them through shell history or process listings.

Skill content
**Set a key (direct):**
```bash
secret-manager DISCORD_BOT_TOKEN "my-token-value"
```
Recommendation

Prefer the interactive prompt or stdin-only input for secrets, and add a clear warning against passing secrets as command-line arguments.

What this means

If that file is modified or the path is redirected, running the skill can execute arbitrary commands as the user.

Why it was flagged

The script sources a user-configurable env file as shell code. That executes any commands in the file, rather than safely parsing key-value pairs.

Skill content
if [ -f "$SECRETS_FILE" ]; then
    echo "Sourcing secrets from $SECRETS_FILE..."
    source "$SECRETS_FILE"
fi
Recommendation

Parse the env file safely instead of using shell source, or require explicit user confirmation and document that the file is executable shell input.

What this means

Secret prefixes could appear in terminal output, chat transcripts, logs, or screenshots if the command is invoked.

Why it was flagged

The list command prints the first eight characters and length of each configured secret. This is partial disclosure of credential material.

Skill content
echo "  $key = ${val:0:8}... (${#val} chars)"
Recommendation

Do not display secret material by default; show only set/not-set status unless the user explicitly requests a reveal.

What this means

Updating a secret may disrupt active OpenClaw gateway sessions or tasks.

Why it was flagged

The script stops, force-kills, and restarts OpenClaw gateway processes. This is aligned with the documented purpose but can interrupt running work.

Skill content
systemctl --user stop openclaw-gateway.service 2>/dev/null || true
pkill -9 -f "openclaw-gateway" 2>/dev/null
systemctl --user start openclaw-gateway.service
Recommendation

Run it when service interruption is acceptable, and consider using graceful restart behavior before force-killing processes.

What this means

Users have less registry-level assurance about where the executable script came from and how it is intended to be installed.

Why it was flagged

The registry-level metadata provides limited provenance and says there is no install spec, even though the artifact includes an executable shell script and SKILL.md frontmatter advertises a bash installer.

Skill content
Source: unknown
Install specifications
No install spec — this is an instruction-only skill.
Recommendation

Verify the script contents and source before running it, and align the registry install metadata with the SKILL.md installer declaration.