Back to skill
Skillv3.3.0
ClawScan security
ERP Claw · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 20, 2026, 10:16 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill mostly matches its ERP purpose (Python + git, local SQLite DB) but includes self-extending/module-install and web-deploy behaviors that are under-specified and could allow downloading/executing code; these aspects need further review before installing.
- Guidance
- This skill appears to be a full-featured local ERP implemented in Python and using a local SQLite DB, which fits its description. However, before installing or enabling it you should: 1) Inspect module_manager.py and any install/update code to confirm module installs are restricted to trusted sources (SKILL.md claims GitHub avansaber/* only). 2) Review the 'setup-web-dashboard' and any deployment scripts to understand what system services (nginx, ports, docker, root privileges) they require — those tools are not declared as dependencies. 3) Run the skill in an isolated/test environment first (not on production hosts) so you can observe network calls and file writes under realistic usage. 4) Backup any important data in ~/.openclaw before use. 5) If you want a deeper check, provide the module_manager.py and setup-web-dashboard-related files so I can verify whether remote code fetches are properly restricted and require explicit confirmation.
Review Dimensions
- Purpose & Capability
- noteThe skill's name/description align with the required binaries (python3, git) and local SQLite usage. However the SKILL.md advertises self-extending modules and a 'setup-web-dashboard' that auto-clones, builds and deploys with nginx+SSL — capabilities that imply additional tools (node, npm, build toolchain, nginx, or docker) and privileges which are not declared in the manifest. That mismatch is noteworthy.
- Instruction Scope
- concernRuntime instructions and SKILL.md emphasize local-first storage (~/.openclaw/erpclaw/data.sqlite) and say network operations (fetch-exchange-rates, install-module/update-modules) require user confirmation. However the repo contains an OS layer (erpclaw-os) and module management/generator scripts (generate_module, install_suite, module_manager, in_module_generator) that can create/install modules and auto-clone repositories. It is unclear from the manifest whether module installation is strictly limited to vetted avansaber/* GitHub repos or whether arbitrary code could be fetched/executed; the SKILL.md promises confirmation before installs but enforcement is not visible here. The 'setup-web-dashboard' step that auto-clones/builds/deploys is a further scope creep: it may touch system services and network ports beyond the stated local-only model.
- Install Mechanism
- okThere is no install spec (instruction-only) so nothing will be automatically downloaded or extracted by the platform installer. That lowers supply-chain risk from the registry. Still, the included scripts themselves perform runtime operations that may fetch code (module installs) when invoked.
- Credentials
- okThe skill declares no required environment variables and only an optional ERPCLAW_DB_PATH to override the default local DB path. Storing data in ~/.openclaw/erpclaw/data.sqlite is consistent with the ERP purpose. It does not request unrelated cloud credentials or broad system config paths in the metadata.
- Persistence & Privilege
- notealways:false and normal autonomous invocation are used. The skill includes cron entries that schedule suggested actions (e.g., process-recurring, generate-recurring-invoices). If the platform runs those cron-triggered actions automatically, the skill could perform periodic DB operations. This is not necessarily malicious, but combined with module-install and web-deploy capabilities (which could alter runtime behavior or add services) it increases the blast radius and should be considered.
