Tinman - AI Failure Mode Research, Prompt Injection & Tool Exfil Detection

MaliciousAudited by VirusTotal on May 11, 2026.

Findings (1)

The OpenClaw AgentSkills skill 'tinman' is a security scanner designed to detect and prevent AI failure modes and attacks. While it requests broad permissions (`read`, `write`, `sessions_list`, `sessions_history`), these are explicitly justified in `SKILL.md` for local analysis of session traces and report generation. The `tinman_runner.py` code confirms all data processing and storage (config, findings, event logs) is confined to the local `~/.openclaw/workspace/` directory. Crucially, the `emit_event` function actively redacts sensitive patterns (e.g., API keys, SSH keys) before writing to local logs, indicating a strong defensive posture. Network connections for the `watch` command default to loopback (`127.0.0.1`) and require explicit opt-in for remote endpoints. The `check` command is designed to *detect* and *block* malicious patterns (like shell injection or credential theft), and the `sweep` command *simulates* attacks for testing purposes, rather than performing them maliciously. There is no evidence of data exfiltration, unauthorized remote control, or persistence mechanisms.