Back to plugin
Pluginv1.3.14

ClawScan security

ClawWatch · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 26, 2026, 12:25 PM
Verdict
benign
Confidence
medium
Model
gpt-5-mini
Summary
The plugin's code, runtime instructions, and manifest are consistent with a telemetry agent that reports node metrics to a hardcoded ClawWatch Worker; nothing obvious is requesting unrelated credentials or performing unexpected installs, but there are a few operational/privacy details you should review before installing.
Guidance
This package appears to be a straightforward telemetry agent, but before installing: 1) Confirm you trust the default Worker endpoint (https://cw.osglab.win) or run your own Worker and pass --base to avoid sending telemetry to the default server. 2) Be aware the agent inherits the Gateway process environment — if your Gateway has secrets (cloud keys, tokens) set as env vars, the agent process will see them; consider running the plugin/agent in a restricted environment. 3) The agent will store node_secret in ~/.clawwatch/agent.json; inspect that file and enforce file permissions. 4) Review whether `openclaw status --json` (if present on your node) contains any sensitive fields you don't want reported; the agent may parse and include status-derived fields. 5) If you need higher assurance, review the full agent source (src/agent.mjs) locally and/or self-host the Worker, then run the agent in an isolated node (or sandbox) first.

Review Dimensions

Purpose & Capability
okName/description claim a telemetry agent + CLI. Source files implement a CLI (setup/bind/run) and an OpenClaw plugin that spawns the CLI as a background service. Hardcoded default Worker base (https://cw.osglab.win) and use of HMAC-signed report endpoints match the stated purpose.
Instruction Scope
noteSKILL.md and README describe only telemetry-related actions (collect system metrics, optionally parse `openclaw status --json`, then POST signed reports). The agent execs a small set of fixed shell commands (df, nvidia-smi, system_profiler, openclaw) to collect metrics. Note: parsing `openclaw status --json` or other CLI outputs may surface configuration/metadata from your Gateway/node; confirm whether that includes any tokens or sensitive fields you don't want sent.
Install Mechanism
okNo network download/install steps in the skill spec; code is bundled in the package. Build/dev tooling is standard (tsup/typescript) and there is no arbitrary remote extract/download. The package does require Node >=22 at runtime (mentioned in README/package.json) even though the registry metadata 'Required binaries' shows none — minor metadata mismatch.
Credentials
noteThe skill does not declare needing API keys or external credentials. The plugin spawns the agent with env = {...process.env}, so the agent inherits the Gateway process environment. The agent writes node secrets to a local state file (~/.clawwatch/agent.json) and uses that secret to HMAC-sign reports — this is expected, but be aware the child process has access to any env variables available to the Gateway. Also the agent will include custom payload via CLAWWATCH_PAYLOAD_JSON if set. Verify your Gateway does not expose other sensitive env vars that you don't want available to the agent.
Persistence & Privilege
okSkill is not always:true and does not modify other skills. It registers a Gateway service that spawns a child process (the agent) — consistent with its role as a background telemetry agent. The agent persists node credentials in a local state file (expected for this use case).