Workspace Casual Lucas

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This workspace helper exposes unrestricted local command execution and arbitrary file reads, including through WhatsApp triggers, without clear workspace limits or approval controls.

Review carefully before installing. This skill may be useful for trusted local automation, but it effectively gives the agent raw shell and file access. Only enable it in a sandbox or trusted workspace, disable WhatsApp triggers for command execution, and require explicit approval for any command or file read.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user or triggering message could cause the agent to run any local shell command, potentially changing, deleting, or exposing files and system state.

Why it was flagged

The skill directly executes an arbitrary command string supplied as an argument, with no validation, approval gate, working-directory restriction, or sandbox.

Skill content
run_command: ({ command }) => { ... const output = execSync(command, { encoding: "utf8" });
Recommendation

Do not install unless you fully trust the source and need raw shell access; prefer a version with an allowlist of safe workspace commands, explicit approval before execution, and sandboxing.

What this means

The skill could read private local files, configuration files, or credentials if a broad path is provided.

Why it was flagged

The file reader resolves and reads any existing path instead of enforcing that the file is inside the declared OpenClaw workspace.

Skill content
const resolvedPath = path.resolve(file); ... return fs.readFileSync(resolvedPath, "utf8");
Recommendation

Restrict file access to an approved workspace root, block sensitive paths, and require explicit user confirmation before reading files outside the workspace.

What this means

If these triggers are active, a matching WhatsApp message could cause command execution or file access through the agent.

Why it was flagged

A WhatsApp-channel trigger captures message text and passes it directly into the unrestricted shell command function, with no authentication or approval controls shown in the artifacts.

Skill content
"pattern": "(?i).*run command (.*)", ... "command": "$1", ... "channels": ["whatsapp"]
Recommendation

Disable external-message triggers for shell/file operations unless sender identity, authorization, and per-action approval are clearly enforced.

What this means

It is harder to verify who maintains the skill or whether updates are trustworthy.

Why it was flagged

The package provenance is not identified, which matters more because the skill grants broad local command and file access.

Skill content
Source: unknown
Recommendation

Only install high-privilege skills from sources and authors you trust, and review the exact code before enabling them.