critical
suspicious.dangerous_exec
- Location
- dist/cli/openclaw-cli.js:24
- Finding
- Shell command execution detected (child_process).
- Evidence
const output = execSync(cmd, {
AdvisoryAudited by Static analysis on May 16, 2026.
Detected: suspicious.dangerous_exec, suspicious.dynamic_code_execution, suspicious.env_credential_access (+2 more)
const output = execSync(cmd, {const makeValidate = new Function(`${names_1.default.self}`, `${names_1.default.scope}`, sourceCode);const makeParse = new Function(`${names_1.default.scope}`, sourceCode);const makeSerialize = new Function(`${names_1.default.scope}`, sourceCode);const makeValidate = new Function(`${N.self}`, `${N.scope}`, sourceCode)const makeParse = new Function(`${N.scope}`, sourceCode)const makeSerialize = new Function(`${N.scope}`, sourceCode)var makeValidate = new Function(
(e=>{"object"==typeof exports&&"undefined"!=typeof module?module.exports=e():"function"==typeof define&&define.amd?define([],e):("undefined"!=typeof window?wind...var makeValidate = new Function(
const {GH_TOKEN_PUBLIC} = process.envSecretKey: [REDACTED],
Authorization: '[REDACTED] Credential=ABCDEF/20121226/us-east-1/sqs/aws4_request, ...'
const password = [REDACTED](__classPrivateFieldGet(this, _encryptionKey), initializationVector.toString(), 10000, 32, 'sha512');
SecretKey: [REDACTED] || this.options.SecretKey || '',
if ([REDACTED] && !this.options.SecretKey) this.options.SecretKey = [REDACTED];
var consumer_secret_or_private_key = [REDACTED] || oa.oauth_private_key // eslint-disable-line camelcase
SecretKey: [REDACTED],
- "Ignore previous instructions and..."