Discrawl

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Discrawl appears purpose-aligned for searching Discord archives, but it can access private Discord data and optional bot credentials through an externally installed CLI.

Before installing, confirm you trust the external Discrawl CLI, use only least-privilege Discord bot credentials, avoid user tokens, and verify any shared archive snapshots exclude secrets and private DMs.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may surface or store private Discord messages while answering archive questions.

Why it was flagged

The skill can read DMs, local Discord Desktop artifacts, and archive snapshots; this is central to its purpose but involves sensitive private content.

Skill content
discrawl dms --last 20 ... Wiretap reads local Discord Desktop artifacts only ... Git-share snapshots must not include secrets or `@me` DM rows.
Recommendation

Use it only with Discord archives you are comfortable searching, and avoid sharing snapshots unless you have verified that secrets and private DM rows are excluded.

What this means

A configured bot may access Discord content within its permissions.

Why it was flagged

The skill may require Discord bot credentials for sync and explicitly distinguishes them from user tokens; credential use is expected but sensitive.

Skill content
Boundaries: bot sync needs configured Discord bot credentials. Wiretap reads local Discord Desktop artifacts only; do not extract user tokens, call Discord as the user, or write to Discord storage.
Recommendation

Use least-privilege bot credentials, do not provide user tokens, and confirm which servers/channels the bot can read.

What this means

Incorrect SQL or an approved unsafe mutation could alter the local archive database.

Why it was flagged

The skill exposes raw SQL and a possible unsafe mutation path, but the documented default is read-only and mutation requires explicit reviewed user request.

Skill content
DISCRAWL_NO_AUTO_UPDATE=1 discrawl --json sql "select count(*) from messages;" ... Never use `--unsafe --confirm` unless the user explicitly requests a reviewed DB mutation.
Recommendation

Keep SQL read-only unless you intentionally want a database change and have reviewed the exact command.

What this means

Future installs could receive a different version of the CLI than the one originally reviewed.

Why it was flagged

The install uses an unpinned @latest Go module, so the fetched binary may change over time even though this is a normal install method for a CLI-based skill.

Skill content
go | module: github.com/openclaw/discrawl/cmd/discrawl@latest | creates binaries: discrawl
Recommendation

Install only if you trust the Discrawl source, and prefer pinning or reviewing the module version in sensitive environments.