Cheat Code

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: cheat-code Version: 1.0.11 The OpenClaw skill 'cheat-code' is designed to allow an AI agent to send its current context to an external service (kenoodl.com) for 'synthesis.' All files consistently describe this purpose and direct network activity to kenoodl.com. The `claw.json` explicitly declares 'network' permissions, which is necessary for its stated function. Crucially, the `instructions.md` file, which serves as the agent's primary instruction set, explicitly advises the agent: 'Do not include secrets, credentials, or API keys in the context you send. Strip them before calling.' This instruction actively mitigates the primary risk of sending agent context to an external service, demonstrating a lack of malicious intent. There is no evidence of unauthorized data exfiltration, persistence mechanisms, obfuscation, or prompt injection designed to subvert the agent for harmful purposes.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private task details, drafts, or business context could be sent to the provider during normal agent operation without the user noticing each call.

Why it was flagged

The skill instructs the agent to decide when to submit broad working context to an external API, but it does not require the agent to ask the user before each submission.

Skill content
Use it when: ... "Your human gave you a complex, open-ended goal" ... POST https://kenoodl.com/api/cli/drop ... { "context": "<the problem, your current thinking, what you've tried, where you're stuck>" }
Recommendation

Require explicit user confirmation before each kenoodl call, minimize the context sent, and redact confidential or regulated information.

What this means

If the token is exposed or overused, someone could make calls against the user's kenoodl account or consume any associated balance.

Why it was flagged

The provider token is disclosed and purpose-aligned, but it grants the agent delegated access to the user's kenoodl account/service.

Skill content
`KENOODL_TOKEN` authorizes your agent to access libraries from outside its training data. Agent sends a request to kenoodl.com.
Recommendation

Store the token only in a secure environment variable or agent secret store, rotate it if exposed, and confirm there is a revocation mechanism.

What this means

Sensitive non-secret information, such as strategy, proprietary ideas, customer context, or internal reasoning, may leave the user's environment.

Why it was flagged

The communication flow sends arbitrary user/agent working context to a third-party provider, and the artifacts do not clearly bound what kinds of context are acceptable beyond telling the agent not to include secrets.

Skill content
POST https://kenoodl.com/api/cli/drop ... { "context": "<the problem, your current thinking, what you've tried, where you're stuck>" }
Recommendation

Define clear data boundaries, require opt-in per request, and document retention, processing, access controls, and whether provider operators or systems can read submitted context.

What this means

A user may provide sensitive context believing it never leaves their machine or is readable only by the user and agent.

Why it was flagged

The local-only privacy framing conflicts with the explicit instruction to send context to kenoodl.com for processing, which may cause users to underestimate off-device sharing.

Skill content
"Your conversations, your data, your ideas stay on your machine" ... "Only you and your agent can read it" ... and "POST https://kenoodl.com/api/cli/drop" with a context payload.
Recommendation

Replace the privacy wording with precise disclosures about what is transmitted, who or what can process it, retention guarantees, encryption model, and any limits of those claims.