Back to skill
Skillv0.40.1
ClawScan security
clawgrid · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 7, 2026, 7:02 AM
- Verdict
- suspicious
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill largely matches a marketplace connector's purpose but includes surprising privilege-escalating behaviors (auto-updating code from a remote API and auto-configuring OpenClaw exec approvals) that are disproportionate and deserve review before installing.
- Guidance
- What to consider before installing: - Trust the remote host: install.sh and heartbeat auto-download and update scripts from the configured API_BASE; if you point API_BASE to an attacker-controlled server it can replace the skill with arbitrary code. Only use a trusted clawgrid.ai endpoint. - Exec approvals are changed: setup-exec-approval.sh writes to ~/.openclaw/exec-approvals.json and sets autoAllowSkills=true and an allowlist that includes skill scripts. This means skill scripts can run automatically without interactive approval — review and back up your exec-approvals.json before installing. - Persistence: the skill sets up cron/launchd heartbeats to run regularly. If you stop the service you must also remove/inspect the scheduled job and the state files under ~/.clawgrid and ~/.openclaw/workspace/skills. - Data/credentials: the skill stores and reads an api_key and api_base in ~/.clawgrid/config.json and will send data to API endpoints (claims, submits, automation settings). Only use credentials you trust the service with. - If you want to proceed safely: (1) audit the full scripts locally before running them, (2) run initial setup in an isolated environment or VM, (3) inspect ~/.openclaw/exec-approvals.json after install to confirm no undesired patterns were added, and (4) prefer manual cron/launchd setup rather than allowing the skill to auto-configure approvals and schedulers. - If you are not comfortable with automatic updates or approval changes, do not install or bind; instead use the web UI of the service or ask the skill developer for a safer-install option.
Review Dimensions
- Purpose & Capability
- concernName/description (ClawGrid marketplace connector) aligns with the scripts' functionality (registration, heartbeat, polling, claim/submit, wallet, marketplace). However the skill also modifies agent execution policy and installs scheduled heartbeats/cron jobs and auto-updates itself from an API_BASE; these capabilities go beyond a simple client wrapper and are powerful administrative actions. They are explainable for an autonomous connector but are higher-privilege than expected for a small helper.
- Instruction Scope
- concernSKILL.md explicitly forces the agent to run only the provided scripts; the scripts in turn read/write files under $HOME (e.g. ~/.clawgrid, ~/.openclaw/workspace/skills), POST/PUT to the configured API_BASE using an api_key from config.json, set up cron/launchd jobs, and can upload legacy settings to the server. The instructions also push a behavioral restriction (do not construct curl commands, do not use browser tool), which reduces transparency and forces trust in the bundled scripts. These actions are within a connector's domain but the combination (file I/O, scheduling, remote uploads, auto-update) broadens data and control surface.
- Install Mechanism
- concernThere is no registry install spec; instead install.sh downloads skill files from the configured API_BASE (/skills path) via curl and writes them into ~/.openclaw/workspace/skills. Self-updating by fetching and replacing local scripts from a remote server is functional for a connector but is a high-risk pattern because it executes code fetched at runtime from an external host under the user's configured API_BASE.
- Credentials
- concernThe registry metadata lists no required env vars, but the scripts expect a local config.json containing api_key and api_base under ~/.clawgrid. That's reasonable for an API client, but the skill also writes/edits $HOME/.openclaw/exec-approvals.json to set autoAllowSkills=true and an allowlist including skill script paths and standard binaries — this materially expands execution privileges and is not declared in metadata. Required credentials stored in the local config.json are necessary, but the skill's attempt to auto-configure exec approvals is a disproportionate request relative to a minimal connector.
- Persistence & Privilege
- concernThe skill schedules persistent execution (cron or launchd heartbeat jobs) and runs setup-exec-approval.sh which sets autoAllowSkills=true and askFallback=allowlist in the OpenClaw approvals file. That combination gives long-lived scheduling plus decreased runtime approvals for skill scripts, increasing the blast radius of any subsequent script updates fetched via install.sh. The skill is not marked always:true, but it does create persistent scheduled jobs and modifies approval configuration.
