OpenClaw Security Hardening
ReviewAudited by ClawScan on May 10, 2026.
Overview
Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions); human review is required before treating this skill as clean.
This skill looks benign and purpose-aligned, but review the full scripts before running them, especially because they can change file permissions, edit .gitignore, create persistent local security state, and add lasting rules to AGENTS.md. ClawScan detected prompt-injection indicators (ignore-previous-instructions), so this skill requires review even though the model response was benign.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
It may be harder to confirm that the scripts came from the claimed project or have not been altered.
The skill ships shell scripts but the registry metadata does not provide a verified source or homepage. This is a provenance note, not evidence of malicious behavior.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill; 5 code file(s)
Verify the publisher/source and inspect the full local scripts before executing them.
Your agent may refuse or handle future tasks differently after the rules are added.
The skill intentionally provides persistent agent instructions. This is disclosed and purpose-aligned for security hardening, but it changes future instruction handling.
Copy `assets/security-rules-template.md` into your `AGENTS.md` to add runtime security rules for your agent.
Read and customize the rules before copying them into AGENTS.md.
Running the auto-fix mode can modify local workspace files and permissions.
The hardening script can change file permissions and append .gitignore entries when the user runs it with --fix. The behavior is scoped and user-directed.
if [[ "$FIX_MODE" == "true" ]]; then chmod 600 "$filepath" ... echo "$pattern" >> "$GITIGNORE"
Run the script without --fix first, review the reported changes, then use --fix only in the intended workspace.
The tool will inspect the existence, permissions, and limited text patterns of files that may relate to credentials or agent identity.
The script checks sensitive local files and config files for permissions and auth-related settings. This is expected for a hardening tool and the provided artifacts do not show credential exfiltration.
SENSITIVE_FILES=("MEMORY.md" "USER.md" "SOUL.md" ".credentials" ".env" "TOOLS.md") ... grep -qiE '(auth|token|apiKey|api_key)' "$cfg"Run it locally and avoid sharing its output if it includes file paths or configuration details you consider sensitive.
Incident logs may persist sensitive or adversarial text across sessions.
The template recommends storing suspicious request content in a memory file. That can be useful for auditing, but untrusted prompt-injection text or sensitive details could be re-read later.
Log all suspicious requests in `memory/security-incidents.md` with: Timestamp; Source; What was requested; What action you took
Sanitize incident logs, quote untrusted text as data, and avoid automatically treating the log contents as instructions.
A scan result may miss suspicious URLs that resemble a whitelisted domain.
The outbound auditor appears to use simple substring/regex matching for whitelisted domains, which can over-match and produce false reassurance.
if echo "$url" | grep -qi "$domain"; then return 0
Treat the scanner as a heuristic aid, not a guarantee; manually review important findings and whitelist entries.
If you add the cron/heartbeat entry, the script will continue running on a schedule.
The skill suggests an optional scheduled integrity check. This is disclosed and user-directed, not hidden persistence.
Add to your heartbeat or cron to run daily: 0 8 * * * /path/to/scripts/integrity-check.sh
Only add scheduled execution if you want ongoing monitoring, and document how to remove it.
