Cloud Mount

ReviewAudited by ClawScan on May 10, 2026.

Overview

Cloud Mount appears to be a coherent rclone-based cloud-drive mounting helper, but it needs your cloud authorization and can run a background autostart service if you enable it.

Install only if you are comfortable using rclone and granting it access to the selected cloud storage. Review the shell scripts, install rclone from a trusted source, protect ~/.config/rclone/rclone.conf, avoid unnecessary sudo, and add exclusions before using the broad backup examples.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone using the mount can potentially read or modify files in the authorized cloud storage scope.

Why it was flagged

The skill requires the user to authorize a cloud storage account through rclone; this is expected for mounting OneDrive/Google Drive, but it relies on sensitive account tokens.

Skill content
在浏览器打开提供的 URL,登录云存储账号并授权
Recommendation

Use a dedicated or least-privilege cloud account/folder when possible, protect ~/.config/rclone/rclone.conf, and review the rclone remote before mounting it.

What this means

If enabled, the cloud mount may keep running after login/reboot until the user disables the service.

Why it was flagged

The script can create and enable a user-level systemd service so the rclone mount runs in the background. This is disclosed as the autostart feature and is optional.

Skill content
systemctl --user enable "$SERVICE_NAME" ... systemctl --user start "$SERVICE_NAME"
Recommendation

Enable autostart only if you want persistent mounting; use the provided disable command and check user service logs/status periodically.

What this means

Following the example without exclusions could upload private keys, tokens, personal files, or system configuration to cloud storage.

Why it was flagged

The documentation includes a scheduled broad backup example that can copy sensitive local directories to the mounted cloud drive. It is user-directed and aligned with the backup use case, but broad automatic backups can propagate mistakes or secrets.

Skill content
rsync -av --delete /etc/ ~/backup/etc/ ... rsync -av --delete /home/ ~/backup/home/ ... 0 2 * * * /bin/bash ~/backup.sh
Recommendation

Before using the backup example, add exclusions for secrets such as rclone.conf, SSH keys, browser profiles, and application tokens; consider encryption and test with a small folder first.

What this means

Installation may appear complete while the skill will not work until rclone is installed from the user's package manager or another trusted source.

Why it was flagged

The registry metadata does not declare rclone as a required binary even though the docs and scripts require it. The dependency is disclosed in the docs, so this is a packaging completeness issue rather than hidden behavior.

Skill content
Required binaries (all must exist): none ... Install specifications: No install spec
Recommendation

Install rclone from an official or trusted package source and verify its version before using the skill.

What this means

A user might rely on the skill's own safety claims instead of reviewing the actual scripts and permissions.

Why it was flagged

The README contains self-attested security/approval language. It is not operationally malicious, but users should not treat embedded approval claims as authoritative.

Skill content
OpenClaw 内部扫描结果:Benign(高置信度)
Recommendation

Base trust on the current artifacts, platform review, and your own inspection rather than on approval claims inside the skill documentation.