Ravi passwords

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: ravi-passwords Version: 2.1.1 The ravi-passwords skill provides a CLI-based interface for managing website credentials via a remote service (ravi.id). It supports standard password management features such as creation, retrieval, updating, and deletion of entries, as well as password generation. While the skill handles sensitive data and transmits it to a remote server, its behavior is entirely consistent with its stated purpose as a password manager, and the SKILL.md contains no evidence of malicious intent, obfuscation, or prompt injection.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A login task for one site could expose many stored website passwords in command output, transcripts, shell history, or logs.

Why it was flagged

The documented list operation returns plaintext passwords and the common pattern uses it to search for one domain, so unrelated saved passwords may be retrieved into the agent/tool context.

Skill content
"ravi passwords list" ... "password": "S3cret!" ... ENTRY=$(ravi passwords list | jq -r '.[] | select(.domain == "example.com")')
Recommendation

Use a metadata-only list or domain-specific lookup if available, retrieve only the credential the user requested, and require explicit user approval before displaying or using any password.

What this means

Anyone or anything that can use this skill in the user’s session may be able to retrieve credentials that grant access to websites.

Why it was flagged

The skill explicitly handles plaintext website credentials through the Ravi service; this is purpose-aligned for a password manager but gives access to user accounts.

Skill content
All credential fields (username, password, notes) are server-side encrypted — you send and receive plaintext.
Recommendation

Install only if you trust Ravi with website passwords, do not store API keys or unrelated secrets here, and limit use to user-approved login/signup tasks.

What this means

An accidental or autonomous update/delete could remove a saved password or replace it with the wrong value, potentially locking the user out of a website.

Why it was flagged

The documented commands can modify or delete stored credentials. That is expected for a password manager, but it is high-impact if invoked without clear user intent.

Skill content
ravi passwords update <uuid> --password "NewPass!" ... ravi passwords delete <uuid>
Recommendation

Require explicit confirmation before create, update, or delete actions, and show the domain and username being changed without exposing the password unnecessarily.

What this means

Users must trust an external Ravi CLI/service that is not reviewed in this artifact set.

Why it was flagged

The artifact provides no code or installation details, while the skill relies on external commands to handle plaintext passwords, so provenance and runtime behavior are not verifiable from the supplied package.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill; Required binaries (all must exist): none
Recommendation

Verify the official Ravi CLI installation source, authentication model, and documentation before using the skill with real passwords.