Back to skill
Skillv0.2.6

Static analysis security

Openclaw Sec · Deterministic local checks for risky code patterns and metadata mismatches.

Scanner verdict

ReviewApr 30, 2026, 4:55 AM
Summary
Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution, suspicious.env_credential_access (+2 more)
Reason codes
suspicious.dangerous_execsuspicious.dynamic_code_executionsuspicious.env_credential_accesssuspicious.exposed_secret_literalsuspicious.prompt_injection_instructions
Engine
v2.4.5

Evidence

criticalsrc/__tests__/cli.test.ts:25
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalsrc/modules/code-execution-detector/__tests__/detector.test.ts:35
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalsrc/modules/command-validator/__tests__/validator.test.ts:193
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalsrc/patterns/runtime-validation/code-execution-patterns.ts:29
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticaltests/zeroleaks-pentest.ts:129
Shell command execution detected (child_process).
suspicious.dangerous_exec
criticalsrc/modules/content-scanner/__tests__/scanner.test.ts:169
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalsrc/patterns/obfuscation/obfuscation-patterns.ts:127
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalsrc/patterns/runtime-validation/code-execution-patterns.ts:125
Dynamic code execution detected.
suspicious.dynamic_code_execution
criticalhooks/legacy/tool-call-hook.ts:98
Environment variable access combined with network send.
suspicious.env_credential_access
criticalhooks/security-tool-validator/handler.ts:102
Environment variable access combined with network send.
suspicious.env_credential_access
criticalREADME.md:604
Documentation appears to expose a hardcoded API secret or token.
suspicious.exposed_secret_literal
warnREADME.md:489
Prompt-injection style instruction pattern detected.
suspicious.prompt_injection_instructions
warnSKILL.md:624
Prompt-injection style instruction pattern detected.
suspicious.prompt_injection_instructions