SkillSentryOpenClaw's Always‑On Security Cop

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could believe their OpenClaw install was scanned and found clean when the panel only simulated that result.

Why it was flagged

The Scan button only waits and then displays a clean result; it does not call audit.sh or inspect real scan output, despite the skill presenting the panel as the recommended security workflow.

Skill content
log('Running audit.sh...'); setTimeout(() => { log('PI hits: 0 malicious'); log('Gateway: Safe'); document.getElementById('status').innerHTML = 'Status: 🟢 CLEAN'; }, 2000);
Recommendation

Do not rely on the panel's clean status. Run the included audit.sh directly and review the JSON output, or require a real panel implementation that executes the audit and displays actual results.

What this means

The report may omit the user's real OpenClaw memory and skill files, creating false confidence from an incomplete scan.

Why it was flagged

The scan defaults to a specific hardcoded user path and silently skips nonexistent paths, so it may not inspect the install it claims to audit unless WORKDIR is set correctly.

Skill content
WORKDIR="${WORKDIR:-/Users/BillyAssist/clawd}" ... SCAN_PATHS=("$WORKDIR/memory" "$WORKDIR/skills" )
Recommendation

Set WORKDIR explicitly to the intended OpenClaw install and add warnings or failures when expected scan paths are missing.

What this means

Setup may fail, or a user may later need extra unreviewed code to make the documented UI/config features work.

Why it was flagged

The documented panel-server and config scripts are referenced by the skill but are not present in the supplied file manifest, so that workflow cannot be verified from the provided artifacts.

Skill content
node scripts/panel-server.js ... node scripts/config.js get ... node scripts/config.js set Scan_freq daily alerts telegram sensitivity high
Recommendation

Treat the package as incomplete unless those helper files are supplied and reviewed; avoid running substitute scripts from untrusted sources.

What this means

Private memory, prompts, or skill text that matches the patterns could appear in report output or logs.

Why it was flagged

The audit scans local memory and skill files and includes matching lines in the JSON report, which is appropriate for prompt-injection detection but may capture sensitive local content.

Skill content
SCAN_PATHS=("$WORKDIR/memory" "$WORKDIR/skills" ) ... "prompt_injection_hits": [l for l in read_file(os.environ["PI_SCAN_FILE"]).splitlines() if l.strip()]
Recommendation

Keep reports local, review them before sharing, and ensure the scan paths are limited to the intended OpenClaw directories.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

If enabled, the audit may continue running periodically after initial setup.

Why it was flagged

The skill documents periodic cron execution, which is a persistence mechanism, but it is disclosed as a user-chosen security-audit cadence.

Skill content
Cron setup: Schedule `scripts/audit.sh` at the chosen cadence.
Recommendation

Only create a cron entry you understand, log output to a controlled location, and remove the cron entry when you no longer want recurring scans.

What this means

The audit will inspect local OpenClaw status and listening localhost services when run.

Why it was flagged

The script runs local status commands and an optional localhost port scan; these are purpose-aligned for a local security audit and do not show external scanning.

Skill content
(openclaw status || true) ... (openclaw gateway status || true) ... (nmap -Pn -p 1-1024 127.0.0.1 || true)
Recommendation

Run it only on systems you control and review the generated report for local service details before sharing it.