Openclaw Coworker Prompts

PassAudited by ClawScan on May 10, 2026.

Overview

This is an instruction-only prompt pack with no code or credentials, but users should be careful because it recommends creating tool-enabled agents with broad abilities like exec, read, edit, web, and memory.

This prompt pack appears safe to install as text-only content, but do not give every generated agent exec, read, edit, web, or memory by default. Use least-privilege tools, supervise high-impact domains like healthcare/legal/finance/DevOps, and re-review any future version that adds code, credentials, or install scripts.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If you create agents from these prompts and grant broad tools, those agents may be able to run commands, read data, or edit files while completing tasks.

Why it was flagged

The prompt pack recommends broad tool access for agents created from its prompts. This is disclosed and user-directed, but exec/read/edit can affect local files or systems if granted too broadly.

Skill content
allowed-tools: [exec, message, memory, web_search, web_fetch] ... Assign relevant tools (web, code, exec) ... Enable tools: `exec`, `web_search`, `read`, `edit`.
Recommendation

Grant only the minimum tools needed for each agent, require confirmation for exec/edit or production-impacting actions, and avoid connecting these prompts directly to sensitive systems without supervision.

What this means

Sensitive details shared while building or using coworker agents could be retained if memory is enabled by the platform or user.

Why it was flagged

The skill declares access to memory, which could persist context if used. The artifacts do not show automatic memory writes, but the purpose and retention boundaries are not described.

Skill content
allowed-tools: [exec, message, memory, web_search, web_fetch]
Recommendation

Disable memory for agents that handle private, medical, legal, financial, or credential-related information unless you have clear retention and deletion controls.

What this means

You have less external context for who maintains the prompt pack or where to audit updates.

Why it was flagged

The package has no verified source or homepage in the supplied metadata, which makes provenance harder to assess even though there is no runnable code or install script.

Skill content
Source: unknown
Homepage: none
Recommendation

Review the prompt text before use, prefer verified sources for future updates, and treat any later version that adds code or install steps as needing a fresh review.