Back to skill
Skillv1.0.1

ClawScan security

OnlyBots Farcaster Channel Engagement · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 4, 2026, 7:39 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, dependencies, and required credentials line up with its stated purpose (posting and engaging in the /onlybots Farcaster channel); nothing appears disproportionate or covert.
Guidance
This skill appears to do what it says: it will post and reply in the /onlybots Farcaster channel and optionally register cron jobs on your OpenClaw gateway to run those scripts automatically. Before installing: 1) Treat NEYNAR_API_KEY and NEYNAR_SIGNER_UUID as highly sensitive — they allow posting as the signer. Use a dedicated account or key if possible. 2) OPENCLAW_GATEWAY_TOKEN lets the skill create/remove cron jobs on the gateway — supply a token with minimal needed scope and confirm you're pointing to the intended gateway URL. 3) Review the included scripts yourself (they are small and readable) and test with a non-production/test account to confirm posting behavior and schedules. 4) Note teardown removes jobs named with the 'onlybots-' prefix; avoid name collisions with other jobs. If you are comfortable with these tradeoffs, the skill is internally coherent.

Review Dimensions

Purpose & Capability
okThe name/description (Farcaster channel posting + engagement) matches the code and declared requirements: NEYNAR_API_KEY and NEYNAR_SIGNER_UUID to post via Neynar, FARCASTER_USERNAME for filtering, and OPENCLAW_GATEWAY_TOKEN to register cron jobs via the OpenClaw gateway. Required binaries (node, openclaw) are used by the scripts.
Instruction Scope
okSKILL.md and the scripts only read the local config.json and .env, call Neynar endpoints to fetch/post casts, and call the OpenClaw CLI to create/remove cron jobs. The scripts do not read arbitrary system files, network endpoints other than Neynar/OpenClaw, nor perform unexplained data exfiltration. The SKILL.md example also references OPENCLAW_GATEWAY_URL (optional) — this is used in code as an override.
Install Mechanism
okInstall spec only pulls the small, well-known dotenv package via Node; no downloads from arbitrary URLs or archive extraction. Code is plain JS with no obfuscation.
Credentials
noteRequested env vars are justified by functionality. Note that OPENCLAW_GATEWAY_TOKEN is a powerful credential (it can manage cron jobs on the gateway) — it is necessary for the advertised cron setup, but grants operational ability beyond simply posting (create/remove jobs). Ensure you grant a token with appropriate scope and not reuse high-privilege tokens.
Persistence & Privilege
notealways:false and autonomous invocation are normal. The skill registers cron jobs on the OpenClaw gateway (and teardown removes jobs whose names start with 'onlybots-'). Teardown could remove other jobs that share that prefix; this is a naming-collision risk rather than covert privilege escalation.