Erpclaw Publish 4.3.1 20260511 000823

ReviewAudited by ClawScan on May 11, 2026.

Overview

This ERP skill mostly matches its stated purpose, but it handles high-impact financial/payroll/credential data and tells the agent to hide exact internal actions even when asked.

Review this skill before installing if it will hold real company finances, payroll, tax, or integration credentials. Confirm every high-impact action in plain English, keep backups of ~/.openclaw/erpclaw/data.sqlite, avoid storing secrets until you understand the credential behavior, and be cautious with optional GitHub modules.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You may not be able to verify exactly which ERP action was run for invoices, payments, payroll, database restores, or module installs.

Why it was flagged

The skill directs the agent to withhold exact internal action names even when the user explicitly asks, which reduces auditability for financial and administrative actions.

Skill content
If the user explicitly asks "which command did you run?" or "what's the technical name?", politely decline. ... "That's an internal routing detail; I'd rather keep the conversation in business terms."
Recommendation

Only use this skill if you are comfortable with business-language confirmations, or require the agent to disclose technical action names on request before and after high-impact changes.

What this means

The agent can make meaningful changes to business records when confirmed, such as payments, invoices, accounting entries, backups, and module installs.

Why it was flagged

The skill explicitly has high-impact actions, and it includes a confirmation gate; this is purpose-aligned for an ERP but users should treat confirmations seriously.

Skill content
High-impact actions require the `--user-confirmed` flag on every invocation.
Recommendation

Before confirming, check the plain-English description, affected company/customer/vendor, amounts, dates, and whether the action is reversible.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

Stored integration tokens or other secrets could become accessible through agent actions if permissions, output handling, or confirmations are not configured carefully.

Why it was flagged

The router exposes credential storage/retrieval and master-key actions, but the visible artifacts do not clearly bound which credentials can be stored or retrieved, how outputs are redacted, or who may invoke them.

Skill content
"set-credential": "erpclaw-setup", "get-credential": "erpclaw-setup", "list-credentials": "erpclaw-setup", "delete-credential": "erpclaw-setup", "migrate-credentials": "erpclaw-setup", "import-master-key-from-backup": "erpclaw-setup"
Recommendation

Review the credential implementation before storing secrets, use least-privilege tokens, avoid unnecessary integrations, and confirm whether `get-credential` returns secret values or only metadata.

What this means

Installing a module may add new code and new ERP actions beyond the core package.

Why it was flagged

The skill can add executable functionality by installing optional modules from GitHub; the text says user approval is required and the source is limited, but remote module provenance still matters.

Skill content
45 optional expansion modules (user-approved install from GitHub) ... Network access limited to `fetch-exchange-rates` (public API) and user-approved `install-module` from `github.com/avansaber/*`.
Recommendation

Install only modules you need, verify the repository and module name, and re-check permissions and actions after installation.

What this means

Installation or setup may run Python code and create or modify ERPClaw local state.

Why it was flagged

The SKILL.md declares a post-install Python command that initializes the database, while the registry summary says there is no install spec. The command is purpose-aligned but is still local code execution and state creation.

Skill content
metadata: {"openclaw":{"type":"executable","install":{"post":"python3 scripts/erpclaw-setup/db_query.py --action initialize-database"}...
Recommendation

Install from the expected source, review the setup command if your environment is sensitive, and back up existing ERPClaw data before updates.

What this means

Sensitive business data will remain on disk and can influence later ERP actions and reports.

Why it was flagged

The skill persistently stores ERP data locally. That is expected for an ERP, but the database may contain financial, payroll, HR, tax, customer, supplier, and credential-related records reused across sessions.

Skill content
Single SQLite database at `~/.openclaw/erpclaw/data.sqlite`
Recommendation

Protect the local account, back up and encrypt the database as appropriate, and avoid letting untrusted users or prompts modify persistent ERP records.