Elasticsearch Openclaw

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is an instruction-only Elasticsearch reference, but it claims to be read-only while including examples that can create or modify Elasticsearch resources.

Install only if you are comfortable reviewing the examples before use. Treat it as documentation that includes both read-only query patterns and some setup/admin patterns; give the agent a read-only Elasticsearch API key for normal use and require explicit approval before running any PUT, POST, indexing, pipeline, inference, or security-management commands.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent or user follows these examples against a real cluster with sufficient credentials, it could create indices, add documents, or create inference endpoints rather than only reading data.

Why it was flagged

These are mutating or administrative Elasticsearch operations, included in a skill advertised as read-only search and analytics documentation.

Skill content
PUT my-index ... POST my-index/_doc ... PUT _inference/text_embedding/jina-embeddings-v3
Recommendation

Clearly separate read-only query examples from setup/admin examples, require explicit user approval before any mutating API call, and label required privileges for each non-read-only operation.

What this means

A user may grant trust or credentials believing the skill only supports read-only activity, while the documentation can still guide an agent toward cluster-changing operations.

Why it was flagged

The read-only safety claim is contradicted by included examples such as API key creation, and other reference files include additional write/setup operations.

Skill content
"No write operations (indexing, updates, deletions) are included or executed by the agent." ... "POST /_security/api_key"
Recommendation

Revise the description and security model to accurately disclose all non-read-only examples, or remove/admin-gate those examples from the read-only skill.

What this means

Search results, mappings, and analytics may expose private business data from Elasticsearch indices.

Why it was flagged

The skill requires an Elasticsearch API key and correctly recommends least-privilege read access, but that credential still grants access to potentially sensitive cluster data.

Skill content
ELASTICSEARCH_API_KEY: "Base64-encoded API key (required, secret)" ... privileges: ["read", "view_index_metadata"]
Recommendation

Use a dedicated API key scoped to only the needed indices and read/view-metadata privileges; do not provide admin or write-capable credentials unless intentionally performing setup.

What this means

Private search queries or document text used for embeddings may leave the Elasticsearch environment and be processed by JINA.

Why it was flagged

The documentation discloses that semantic search/inference can send query or indexing text to an external provider.

Skill content
⚠️ Every query and indexing operation calls api.jina.ai
Recommendation

Only use the JINA inference path for data you are allowed to send to that provider, and review provider terms, retention, and access controls.