WhatsApp Group Admin

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly read-only, but it deserves review because it reads local WhatsApp credential/profile files to list group information without declaring that sensitive access.

Only install or use this if you are comfortable letting the agent inspect your local OpenClaw WhatsApp credential/profile directory and show group metadata in the conversation. Prefer running list/info only when explicitly needed; the provided code does not show network exfiltration or destructive group changes.

Findings (1)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the list or info commands can disclose WhatsApp group IDs, names, creation times, and member counts to the agent/chat context.

Why it was flagged

The script accesses the local WhatsApp credential/profile directory and contacts file to infer group names and member counts. That is sensitive account state, and the registry metadata declares no primary credential or required config path.

Skill content
const CREDS_PATH = path.join(... '.openclaw'), 'credentials', 'whatsapp', 'default'); ... fs.readdirSync(CREDS_PATH); ... const contactsPath = path.join(CREDS_PATH, 'contacts.json');
Recommendation

Declare the WhatsApp credential/config path in metadata and SKILL.md, explain exactly what is read and output, and ask the user before enumerating all groups.