Openclaw Sec
Analysis
Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions, you-are-now, system-prompt-override); human review is required before treating this skill as clean.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Automated Actions - Block, warn, or log based on severity
The skill can influence whether agent requests are allowed, warned, logged, or blocked; this is central to a security product but affects agent behavior.
sets up hooks for automatic protection
Automatic hooks are disclosed and purpose-aligned, but they create persistent monitoring/enforcement behavior after installation.
Source: unknown; Homepage: none
The registry metadata does not provide clear upstream provenance, which matters more for a skill that installs security hooks.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Owner user IDs - these users bypass all security checks
The configuration supports privileged identities that bypass validation, which is useful for administration but weakens enforcement if misconfigured.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
logging: enabled: true ... retention_days: 90 ... database: path: .openclaw-sec.db ... retention_days: 365
The skill stores security events and analytics locally for extended periods, which may include sensitive prompts, paths, findings, or user/session metadata.
notifications: enabled: false ... channels: webhook ... slack ... discord ... email
External notification channels are documented and disabled by default, but enabling them could transmit security findings to third-party services.
