clawsync

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: clawgitsync Version: 1.0.0 The skill provides backup and migration utilities for OpenClaw state, including a Git-native workflow and a token-protected HTTP server for archives. It is classified as suspicious due to high-risk patterns: it promotes a 'curl | bash' installation method from a third-party GitHub repository (linsheng9731/clawsync), requests 'high' trust permissions, and implements a network listener ('clawsync serve') that exposes sensitive data like credentials and session tokens from ~/.openclaw. While these features are plausibly related to its stated purpose, the combination of broad file access, network exposure of secrets, and unverified remote installation scripts significantly increases the attack surface.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the installer could place unreviewed code on the machine that can later read, write, back up, or restore OpenClaw state.

Why it was flagged

The install path executes a remote script fetched from a mutable GitHub branch. Because the submitted package is instruction-only and the tool would handle sensitive OpenClaw state, this creates a material provenance and review gap.

Skill content
curl -fsSL "https://raw.githubusercontent.com/linsheng9731/clawsync/main/scripts/install.sh" | CLAWSYNC_GH_REPO="linsheng9731/clawsync" bash
Recommendation

Inspect the installer and source before running it, prefer a pinned release with checksums/signatures, and avoid piping remote scripts directly into a shell.

What this means

If archives are pushed to the wrong Git remote, served too broadly, or restored incorrectly, account tokens or sessions could be leaked or overwritten.

Why it was flagged

The skill explicitly requests broad read/write access to OpenClaw state and acknowledges that archives may include credentials and session material.

Skill content
- read: ~/.openclaw
- write: ~/.openclaw
...
Archives may contain sensitive data (`openclaw.json`, credentials, sessions).
Recommendation

Use only private remotes, review what is included, use include/exclude controls, keep archives encrypted or otherwise protected, and test restores with --dry-run first.

What this means

A mistaken restore or prune command could overwrite local OpenClaw data or remove backup branches.

Why it was flagged

The documented commands can apply restores or prune remote backup branches. The skill also instructs agents to run --dry-run first and use --yes only after explicit confirmation, so this is disclosed but still high-impact.

Skill content
clawsync pull --repo-dir ~/.clawsync-repo --branch <branch> --yes
clawsync unpack --from /path/to/archive.tar.gz --yes
clawsync git prune-branches --repo-dir ~/.clawsync-repo --keep-days 30 --dry-run
Recommendation

Always review dry-run output, confirm exact paths and branches, and keep an independent backup before applying destructive or overwrite operations.

What this means

If the server is exposed beyond the intended machine or the token is shared, sensitive backup archives could be accessed or modified.

Why it was flagged

The skill can start an HTTP archive service with upload, download, backup, and restore endpoints. Token protection and localhost-only restore behavior are disclosed, but the service can expose sensitive archives if misconfigured.

Skill content
clawsync serve --token "<secret>" --port 7373
...
GET /download/<filename> (token required)
POST /upload (token required)
POST /restore/<filename>?dry_run=1|confirm=1 (localhost-only)
Recommendation

Bind the service to localhost where possible, use a strong token, avoid public exposure without TLS and a reverse proxy, and stop the server when it is no longer needed.

What this means

A scheduled backup could continue running after the immediate task and keep writing archives or pushing data.

Why it was flagged

The skill declares crontab as a required binary and advertises periodic backups, indicating possible scheduled behavior. This fits the backup purpose but should remain user-controlled.

Skill content
requires:
  bins: ["node", "git", "tar", "crontab"]
...
run periodic backups
Recommendation

Only enable scheduled backups intentionally, document the schedule, and inspect/remove related crontab entries when no longer needed.