Exposed secret literal
- Finding
- File appears to expose a hardcoded API secret or token.
- Content
apiKey = [REDACTED];
Security checks across static analysis, malware telemetry, and agentic risk
This canary memory skill mostly matches its stated purpose, but it needs review because it appears to ship an embedded API secret and includes tools that can modify persistent memories without a separate confirmation step.
Review before installing, especially because this is labeled as a canary build. Do not use an existing crypto wallet recovery phrase. Confirm that the publisher has removed or explained the reported hardcoded API key, and use the memory-deletion or consolidation tools only after previewing exactly what will change.
apiKey = [REDACTED];
**System Prompt:**
VirusTotal engine telemetry is currently stale for this artifact.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An embedded key could be abused, billed unexpectedly, revoked, or used for undisclosed provider calls depending on what the code does at runtime.
A hardcoded API key or token in source code is credential exposure and is not justified by the documented memory functionality, especially when no credential is declared in metadata.
Static scan: "suspicious.exposed_secret_literal ... Evidence: apiKey = [REDACTED];"
Remove the hardcoded key, rotate it, require users to provide their own provider credentials through documented configuration, and declare those credentials in metadata.
If invoked by the agent at the wrong time, the user could lose memories or have records merged in ways they did not explicitly approve.
The tool can delete or merge persistent memories, and the documented default is to execute rather than preview, without a separate confirm parameter.
totalreclaw_consolidate ... "merge near-duplicates" ... "removes redundant copies" ... "dry_run ... Default: `false`"
Make dry-run the default, require an explicit confirmation parameter for destructive consolidation, and show the exact memories to be removed before applying changes.
Personal or work details from chats may persist across sessions and influence future agent behavior, even when the user does not manually save each item.
The skill intentionally persists conversation-derived memories and reinjects them into future agent context, which is central to its purpose but sensitive.
"Load relevant memories before processing each message"; "Extract and store facts after each turn"; "Flush all memories before context compaction"
Install only if you want persistent memory, review remembered items periodically, use forget/export controls, and avoid discussing secrets you do not want stored.
Users or agents may be confused about whether they are installing a scanner-validation canary or the normal production TotalReclaw skill.
The registry entry is for a canary package named totalreclaw-canary version 3.1.0-canary.0, but SKILL.md presents the production-facing name, version, and install command.
name: totalreclaw ... version: 1.6.0 ... `openclaw skills install totalreclaw`
Make the canary status explicit in SKILL.md and ensure install commands, slug, package name, and version match the artifact being published.