WOLP LAN Power Control
PassAudited by VirusTotal on May 9, 2026.
Overview
Type: OpenClaw Skill Name: wolp Version: 0.0.2 The skill provides a utility for remote power management (Wake-on-LAN and shutdown) but contains high-risk instructions in SKILL.md that direct the agent to perform system-level installations. It instructs the agent to download and install binaries from an external GitHub repository (github.com/leeyeel/WOL-plus), execute local shell scripts not provided in the bundle (e.g., scripts/build-deb.sh), and configure system services with sudo privileges. While these actions are aligned with the stated purpose of deploying a WOL-plus client, the combination of remote artifact execution and lateral movement capabilities represents a significant security risk.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A mistaken target MAC/IP or unintended invocation could send a power-control packet to the wrong LAN device.
The included script sends UDP packets to a specified host/port for shutdown support. This matches the stated purpose, but it is a high-impact device-control action.
with socket.socket(socket.AF_INET, socket.SOCK_DGRAM) as sock:
sock.sendto(payload, (normalized_host, normalized_port))Confirm the target MAC address, IP address, port, and intended action before non-dry-run use; prefer `--dry-run` first.
Installing an unverified external package or build output as a service could affect the target machine beyond this skill.
The documented setup can download and install external release packages or build scripts with elevated privileges. This is related to the WOL-plus client purpose, but the artifacts do not show pinning, checksums, or signature verification.
download `installer_windows_amd64_v<version>.exe` from Releases ... `sudo dpkg -i wolp-client_<version>_amd64.deb` ... `bash scripts/build-deb.sh amd64 0.0.0-dev`
Use a trusted, pinned release; verify checksums/signatures where available; avoid sudo installation unless you trust the WOL-plus client source.
Until changed, anyone who can reach the Web UI may be able to access the client using default credentials.
The optional client exposes a Web UI with known default credentials. SKILL.md does tell the user to change the default password, so this is disclosed, but it is still a privilege boundary to notice.
Default Web UI access: ... username: `admin` ... password: `admin123`
Change the default password immediately, restrict access to the Web UI, and install only on machines you administer.
The agent may list or reuse a device entry that was not created for your network, and LAN device identifiers from prior use are persisted in the skill directory.
The bundled persistent inventory contains a real-looking LAN device record rather than an empty or clearly sample-only entry. Because the skill can act on inventory entries by device name, this stale context could be over-trusted or used for an unintended power-control target.
"device-c87f54": {
"mac": "C8:7F:54:9E:60:B2",
"host": "192.168.50.18",
"extra_data": "AA:BB:CC:DD:11:22"
}Clear or replace `assets/devices.json` before use, require explicit user-provided device details, and avoid acting on bundled inventory entries unless you created them.
