AuditClaw Idp

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may grant broader Google Workspace audit-log access than is necessary for the advertised checks.

Why it was flagged

The setup asks users to grant an additional Google Admin Reports audit-read scope even though the security model says only Directory user read access is used and the visible checks only require user/admin directory data.

Skill content
Security Model: "Google Workspace uses `admin.directory.user.readonly` scope only." ... Grant OAuth Scopes: `https://www.googleapis.com/auth/admin.directory.user.readonly`; `https://www.googleapis.com/auth/admin.reports.audit.readonly`
Recommendation

Grant only the minimum Google scopes needed for the checks unless the skill actually implements and clearly documents audit-log collection.

What this means

If a highly privileged admin creates the token, that token may carry sensitive Okta account authority even though the skill only intends to read data.

Why it was flagged

The Okta token model can give the skill credentials with broader account authority than the read-only API calls shown in the code, depending on which admin creates the token.

Skill content
"note": "Okta API tokens inherit the permissions of the admin who creates them. Use a read-only admin or Super Admin with care."
Recommendation

Create the Okta token from the least-privileged read-only admin role available, restrict its use to this skill, and rotate it if no longer needed.

What this means

Sensitive identity-security posture information may remain in the local GRC database after the scan.

Why it was flagged

The skill persistently stores identity-provider evidence, which can include user emails, MFA status, admin status, login activity, and policy details.

Skill content
Data flow: Check results stored as evidence in `~/.openclaw/grc/compliance.sqlite` via auditclaw-grc
Recommendation

Protect the compliance database with appropriate filesystem permissions, backups, retention rules, and access controls.

What this means

Running the sweep changes the local compliance database by adding evidence and integration status records.

Why it was flagged

The skill invokes another local AuditClaw script to add evidence to the GRC database. The command is structured and purpose-aligned, but it is still a local tool chain that mutates persistent data.

Skill content
cmd = [sys.executable, db_query, "--db-path", db_path, "--action", "add-evidence", ...]
proc = subprocess.run(cmd, capture_output=True, text=True)
Recommendation

Run it only against the intended database path and confirm auditclaw-grc is the expected companion skill.

What this means

Users may need to manually inspect and install dependencies rather than relying on registry install metadata.

Why it was flagged

The registry-level install information does not fully reflect that SKILL.md describes executable Python scripts and a pip requirements file.

Skill content
Install specifications: No install spec — this is an instruction-only skill.
Recommendation

Review scripts/requirements.txt before installing and prefer a virtual environment for the Python dependencies.