Telegram Group Onboard

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for Telegram group onboarding, but it broadly opens group access and mutates OpenClaw configuration with limited scoping or confirmation.

Install only if you intentionally want this bot to process Telegram group messages broadly. Before running it, confirm the exact server and chat ID, prefer mention-only or allowlist mode unless you need open access, review the config diff/backups, and restrict who can add persistent project knowledge.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

People in the group may be able to trigger the bot on ordinary group messages, which can expose conversation content to the bot and any tools it has.

Why it was flagged

This explicitly expands the Telegram bot's permission boundary so group members can invoke it without mentioning it.

Skill content
`requireMention: false` — bot responds to ALL messages (no @mention needed); `groupPolicy: open` — any group member can trigger the bot
Recommendation

Default to allowlist and requireMention=true unless the user explicitly confirms the group, server, and desired access level.

What this means

A mistaken host, chat ID, or default option could change the wrong gateway configuration and make the bot respond more broadly than intended.

Why it was flagged

The workflow uses raw shell/SSH commands to change bot configuration on a local or remote host, with broad defaults and no explicit approval gate shown.

Skill content
scp scripts/add-telegram-group.sh <server>:/tmp/
ssh <server> "bash /tmp/add-telegram-group.sh <chat_id> false open"
Recommendation

Require an explicit user confirmation, show the exact host/chat ID/config diff, and prefer reversible allowlist-only changes before running remote commands or restarting services.

What this means

Users may enable a broad access mode without fully understanding that group members can cause the bot to process ordinary group messages.

Why it was flagged

The safety claim may understate the risk of enabling open group access, especially when combined with no-mention responses and possible tool use by the bot.

Skill content
**Recommended fix:** Set `channels.telegram.groupPolicy: "open"` at the top level. This is safe when `dmPolicy: "pairing"` is active
Recommendation

Replace the blanket safety statement with a clear warning about who can trigger the bot, what data it will process, and when allowlist/mention-only mode is safer.

What this means

If many group members can add permanent knowledge, inaccurate or malicious entries could affect future bot responses in that group.

Why it was flagged

The skill tells the group that saved knowledge is persistent and automatically loaded on future messages, which can influence later agent behavior.

Skill content
Alles was ihr als Knowledge speichert, lade ich bei jeder Nachricht automatisch mit.
Recommendation

Limit who can add persistent knowledge, review knowledge entries, and avoid storing sensitive or instruction-like content without moderation.

What this means

Users have less metadata to verify the origin and runtime prerequisites before allowing the skill to change gateway configuration.

Why it was flagged

The registry metadata gives limited provenance and does not declare command dependencies, even though the supplied workflow includes a shell helper.

Skill content
Source: unknown; Homepage: none; Required binaries (all must exist): none; No install spec — this is an instruction-only skill.
Recommendation

Review the included script before use, verify required tools such as jq/ssh/scp are present, and prefer skills with clearer provenance and declared requirements.