Keep Protocol
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
OpenClaw Agent Skill Suspicious High-Entropy/Eval files: 11 The skill is classified as suspicious due to the `ensure_server()` function in `python/keep/client.py` and exposed via the `keep_ensure_server` MCP tool. This function attempts to auto-bootstrap the `keep-protocol` server by either executing `docker run` to pull and run a Docker image from `ghcr.io/clcrawford-dev/keep-server:latest` or by running `go install github.com/clcrawford-dev/keep-server@latest` and executing the compiled binary. While the stated intent is to legitimately start the skill's own server component, this capability involves downloading and executing remote code, which is a high-risk operation that could be leveraged in a supply chain attack if the specified repositories were compromised. No other clear malicious intent (e.g., data exfiltration to unknown endpoints, persistence, or explicit prompt injection for harmful objectives) was found.
