Back to skill
Skillv1.0.1
ClawScan security
PPQ.AI Private Mode · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 12, 2026, 3:45 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's instructions are coherent with its stated purpose (installing a PPQ private-mode proxy) but they ask you to install third‑party code from GitHub and to store your PPQ API key in your OpenClaw config — actions that carry notable risk and lack verification steps.
- Guidance
- This skill does what it says (sets up a local PPQ proxy and configures OpenClaw) but requires you to install code from a GitHub repo and to store your PPQ API key in your OpenClaw configuration. Before installing: (1) verify the GitHub repository and its owner (PayPerQ) and inspect the code or releases (prefer a pinned release commit or checksum); (2) back up ~/.openclaw/openclaw.json; (3) consider creating a revocable or limited-scope PPQ key if possible; (4) prefer to run the install commands manually rather than allowing an agent to do them autonomously; (5) after installation, review the plugin's code and network behavior (e.g., confirm it only proxies to PPQ endpoints and doesn't exfiltrate keys). If you don't trust the repo or cannot review the code, do not install.
Review Dimensions
- Purpose & Capability
- okName and description match the runtime instructions: the skill asks for a PPQ API key, installs a PPQ proxy plugin, updates OpenClaw's config to point at a local proxy, and restarts the gateway. The requested artifacts (API key, plugin install, config changes) are expected for enabling a local encrypted proxy workflow.
- Instruction Scope
- noteInstructions are narrowly scoped to installing a plugin, merging JSON into ~/.openclaw/openclaw.json, and restarting the OpenClaw gateway. These actions are in-scope for installing a provider plugin, but they touch persistent user configuration and a user systemd service. The doc does not instruct any broad system scans or access to unrelated files, but it also does not require verifying the plugin before installation.
- Install Mechanism
- noteThere is no embedded install spec, but the instructions call out to `openclaw plugins install https://github.com/PayPerQ/ppq-private-mode-proxy`. Downloading and running code from a third‑party GitHub repository is common but inherently risky without integrity checks or a pinned release; the instructions include no verification (commit hash, checksum, or release tag).
- Credentials
- okThe only secret requested is the user's PPQ API key (sk-...), which is proportionate to a plugin that must authenticate to PPQ. However, the instructions require persisting that key in OpenClaw's plugin config, which is sensitive — the skill does not provide guidance on secure storage, rotation, or least-privilege keys.
- Persistence & Privilege
- concernThe instructions modify a user config file (~/.openclaw/openclaw.json) and restart the user's openclaw-gateway.service. Those are reasonable for plugin installation but are high-impact operations. Because the platform allows autonomous invocation by default, an agent could perform these changes automatically. The skill does not request 'always: true', but the potential for automated modification of persistent config and service restart increases risk and warrants user confirmation and code review before running.
