Truclaw Biometric

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This is a plausible biometric approval plugin, but it asks for very sensitive identity enrollment and sends tool-call arguments to external services while giving limited evidence about scope and safeguards.

Review this carefully before installing. If you proceed, inspect the source code, verify that approvals are tied to the exact action being run, consider self-hosting the relay, and avoid using it with sensitive tool arguments unless you accept the external data flows and ID-enrollment requirements.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

A biometric approval could potentially authorize broader or different actions than the user expects if the implementation is not tightly bound to the exact tool call.

Why it was flagged

The plugin can gate high-impact tool calls before they execute, but the documented pass/fail signal appears to be an age/KYC flag rather than clearly action-bound approval for the exact command, message, or file operation.

Skill content
The plugin runs in a privileged before_tool_call hook ... isAbove21=true → action proceeds / isAbove21=false → action blocked
Recommendation

Review the plugin source before installing and confirm the iPhone prompt displays the exact tool name and arguments and that the signed JWT binds to that exact action.

What this means

Installing and using this skill may require you to provide sensitive identity documents to an app workflow that is outside the submitted artifact review.

Why it was flagged

Government ID/passport scanning is highly sensitive identity collection and is not clearly necessary for a Face ID-based OpenClaw action approval guardrail.

Skill content
Complete one-time enrollment:
- Take a selfie
- Scan your Driver's License or Passport
Recommendation

Do not enroll unless you understand why ID verification is required, trust the iOS app and its privacy model, and are comfortable with the identity-data handling.

What this means

Sensitive command parameters or message contents could be sent to an external model provider during danger classification.

Why it was flagged

The artifact discloses that tool names and arguments are sent to Anthropic. Tool arguments can include personal messages, file paths, secrets, payloads, or other sensitive content, so the 'no personal data' claim is not guaranteed by the artifact.

Skill content
Danger classification (Claude Haiku) | Anthropic API — tool name and args only, no personal data
Recommendation

Assume tool arguments may leave your environment; avoid using it with sensitive data unless redaction, logging, retention, and provider terms are acceptable.

What this means

You would be installing and trusting code that was not available in this review package.

Why it was flagged

The actual npm/GitHub code that implements the privileged hook was not included in the artifact set, so the clean static scan does not validate the runtime behavior.

Skill content
No code files present — this is an instruction-only skill. The regex-based scanner had nothing to analyze.
Recommendation

Inspect the linked repository or npm package, verify provenance, and pin a trusted version before installing.

What this means

Users may overestimate the protection provided and approve installation without reviewing the privileged code path.

Why it was flagged

The documentation makes very strong security assurances, but the reviewed artifacts do not include the implementation needed to substantiate those claims.

Skill content
No chat account compromise, no prompt injection, no replay attack can forge this.
Recommendation

Treat the claims as design goals until independently verified in source and runtime behavior.