AuditClaw Gcp

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: auditclaw-gcp Version: 1.0.2 The OpenClaw AgentSkills bundle 'auditclaw-gcp' is designed for GCP compliance evidence collection, performing read-only checks across various GCP services. All interactions with GCP APIs are read-only, and results are stored locally in `~/.openclaw/grc/compliance.sqlite`. The skill uses standard Google Cloud SDKs, with dependencies pinned in `scripts/requirements.txt`. While `scripts/gcp_evidence.py` uses `subprocess.run` for inter-skill communication with `db_query.py` (from `auditclaw-grc`), the arguments are constructed from internal data and JSON-encoded, mitigating direct shell injection risks from this skill. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, obfuscation, or prompt injection attempts in `SKILL.md` or `README.md`. The requested IAM roles are explicitly read-only, aligning with the stated purpose.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill can read a wide range of GCP project metadata, IAM/security settings, resource names, and audit-relevant configuration, though the provided code shows read-only GCP API usage.

Why it was flagged

The skill requires GCP credentials and project-level read roles, including broad viewer and security-reviewer access, to inspect cloud configuration.

Skill content
**Credentials**: Uses standard GCP credential chain (`GOOGLE_APPLICATION_CREDENTIALS` or `gcloud auth`). ... Required IAM Roles ... `roles/viewer` ... `roles/iam.securityReviewer`
Recommendation

Use a dedicated service account limited to the intended project, grant only the documented read-only roles, store the JSON key securely, and rotate or revoke it when no longer needed.

What this means

The local GRC database may retain sensitive cloud security evidence such as resource names, service account emails, firewall findings, and configuration details that other GRC workflows may later read.

Why it was flagged

The orchestrator stores detailed check results, including JSON evidence, in a persistent local GRC SQLite database.

Skill content
DEFAULT_DB_PATH = os.path.expanduser("~/.openclaw/grc/compliance.sqlite") ... "--file-content", json.dumps(result, default=str)
Recommendation

Protect the GRC database file, avoid running the sweep against unintended projects, and review or remove stored evidence before sharing backups or workspaces.

What this means

Running this skill may also run code from the companion auditclaw-grc skill, which is expected for the integration but means both skills must be trusted.

Why it was flagged

When the companion auditclaw-grc helper is present, this skill executes that local db_query.py script to add evidence to the shared database.

Skill content
cmd = [sys.executable, db_query, "--db-path", db_path, "--action", "add-evidence", ...] ... subprocess.run(cmd, capture_output=True, text=True)
Recommendation

Install auditclaw-grc from a trusted source and keep both skills updated; if desired, review the companion db_query.py before running evidence collection.