OpenClaw Health Brief

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its health-brief purpose, but it needs sensitive health account credentials and the main scripts it tells you to run are missing from the reviewed package.

Review before installing. Ask the publisher to include the missing ./bin scripts, inspect any re-auth code before entering provider credentials, use a dedicated 1Password vault, avoid enabling OPENCLAW_1P_WRITEBACK unless needed, and only enable the cron job if the output path and delivery channel are private.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may fail as packaged, or a user may be pushed toward running credential-handling code that was not present in the reviewed artifacts.

Why it was flagged

The setup depends on ./bin/health-reauth and ./bin/health-brief, but the provided file manifest contains no bin/ files. Those missing entrypoints are central to OAuth re-auth, token persistence, and daily execution.

Skill content
python3 ./bin/health-reauth all ... ./bin/health-brief --date "$(date +%F)"
Recommendation

Do not run the re-auth or cron workflow until the package includes the referenced bin scripts and their provenance and behavior can be reviewed.

What this means

Installing and using the skill gives the workflow access to health-service credentials and potentially a 1Password vault selected by the user.

Why it was flagged

The skill asks for 1Password access and provider OAuth tokens. This is expected for a health-provider integration, but it is sensitive account access and is not reflected in the registry credential/env-var declarations.

Skill content
export OP_SERVICE_ACCOUNT_TOKEN="your-token" ... WHOOP_ACCESS_TOKEN ... OURA_PERSONAL_ACCESS_TOKEN ... WITHINGS_REFRESH_TOKEN
Recommendation

Use a dedicated, least-privilege 1Password vault/service account and only provide tokens for providers you actually want included.

What this means

A refreshed OAuth token could be visible locally while the 1Password edit command is running.

Why it was flagged

When OPENCLAW_1P_WRITEBACK=1 is enabled, the rotated secret value is embedded directly in the 1Password CLI command arguments, which can expose secrets to local process inspection on some systems.

Skill content
cmd = ["op", "item", "edit", item_title, f"{field_name}={value}"]
Recommendation

Avoid enabling 1Password writeback unless you understand the local exposure risk; prefer safer secret-update mechanisms that do not place token values in process arguments.

What this means

If enabled, the agent will automatically fetch and summarize health data every morning.

Why it was flagged

The skill documents a persistent daily OpenClaw cron job that runs an agent session, executes the brief, reads the output, and reports a summary. This is disclosed and purpose-aligned, but it is ongoing automation.

Skill content
openclaw cron add --name "morning-health-brief" --schedule "0 8 * * *" --session-target isolated
Recommendation

Only add the cron job if you want ongoing automation, verify the delivery channel is private, and remove the cron job if you no longer want automatic health summaries.

What this means

Daily sleep, readiness, activity, weight, and related metrics may remain on disk and may be sent through the configured reporting channel.

Why it was flagged

The workflow writes health metrics to a local JSON file and has an agent read and summarize it. This is part of the intended workflow, but the file contains sensitive health context.

Skill content
--out "/tmp/daily_health_$(date +%F).json"\nRead the JSON output. Report only non-null metrics
Recommendation

Store outputs in a private location, clean up old files, and be careful about where the summary is delivered.