Back to skill
Skillv2.0.1

ClawScan security

Web Claw · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 10, 2026, 12:52 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The files, scripts, and runtime instructions are coherent with a web dashboard installer: it legitimately needs elevated privileges, system packages, and to fetch the project source from GitHub; review and trust the upstream repo before running.
Guidance
This skill is internally consistent with its description, but it will perform system-level changes: it clones code from GitHub (pinned tag v2.1.0), installs packages into a venv, builds frontend assets with npm, writes nginx/site configs and systemd service units, and enables persistent services. Before installing: (1) verify and review the upstream GitHub release tag and templates (nginx/systemd) to ensure you trust the source; (2) be prepared to run with sudo and to restore/backup nginx and systemd configs if needed; (3) ensure DNS for any domain you plan to use points to the server before running certbot; (4) if you run other OpenClaw skills, note webclaw may import a shared erpclaw lib under ~/.openclaw — this is optional but examine it if present. If uncertain, test in a VM or isolated host first.

Review Dimensions

Purpose & Capability
okThe skill claims to install and run a web dashboard and the included assets match that purpose: nginx, certbot, python, node/npm, systemd services, a local SQLite DB, and a pinned GitHub clone are all expected for this functionality.
Instruction Scope
noteSKILL.md directs running check_deps.sh and install.sh which perform network fetches (git clone of a pinned release tag), install Python/npm deps, initialize a local SQLite DB, and write nginx/systemd configs. db_query.py also reads/writes the local DB and may import an erpclaw shared library from ~/.openclaw/erpclaw/lib if available — this is a cross-skill shared-lib usage (fallbacks exist). All actions are within the dashboard's scope but because they touch system config and other OpenClaw paths, review is advised.
Install Mechanism
noteThere is no platform package install spec; installation is driven by included scripts which clone the repo from GitHub (https://github.com/avansaber/webclaw at tag v2.1.0), create a venv, run pip/npm, and write files into /etc and systemd. Using a pinned GitHub tag reduces risk, but the installer does fetch and execute code from the network and will write system-wide configs.
Credentials
okThe skill does not request secrets or external API keys. It exposes an optional WEBCLAW_DOMAIN env var and uses SUDO_USER and the current user's home for paths — these are reasonable for a service installer. db_query.py inspects /etc/nginx/sites-enabled/webclaw and ~/.openclaw for local data, which aligns with its management role.
Persistence & Privilege
noteThe installer requires sudo and will create/enable systemd services and nginx configs (persistent, system-wide presence). This is expected for a web service but is a high-privilege operation — ensure you are prepared for system-level changes.