Back to plugin
Pluginv1.3.14

Static analysis security

ClawWatch · Deterministic local checks for risky code patterns and metadata mismatches.

Scanner verdict

SuspiciousApr 26, 2026, 12:24 PM
Summary
Detected: suspicious.dangerous_exec, suspicious.env_credential_access, suspicious.potential_exfiltration
Reason codes
suspicious.dangerous_execsuspicious.env_credential_accesssuspicious.potential_exfiltration
Engine
v2.4.0

Evidence

criticaldist/index.js:43
Shell command execution detected (child_process).
runChild = spawn(process.execPath, [agentScript, "run", "--base", base], {
criticalsrc/agent.mjs:226
Shell command execution detected (child_process).
const out = execSync('df -h / | tail -1', { timeout: 5000 }).toString().trim();
criticalsrc/index.ts:63
Shell command execution detected (child_process).
runChild = spawn(process.execPath, [agentScript, 'run', '--base', base], {
criticalsrc/agent.mjs:43
Environment variable access combined with network send.
const LANG = (process.env.OPENCLAW_LANG || Intl.DateTimeFormat().resolvedOptions().locale || 'en')
warnsrc/agent.mjs:68
File read combined with network send (possible exfiltration).
const raw = fs.readFileSync(p, 'utf8');