Multi User Workspace

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Profile and relationship files may contain personal details or behavioral instructions that the assistant will reuse across sessions.

Why it was flagged

The skill intentionally loads persistent user profile and relationship files into the assistant's context at session start.

Skill content
Read `FRIENDS/{userId}.md` for user profile; Read `RELATIONS/*{userId}*.md` for all relationships involving this user
Recommendation

Keep FRIENDS/ and RELATIONS/ private, avoid storing secrets or unnecessary sensitive details, and review these files regularly for outdated or unsafe instructions.

What this means

If role assignments or session bindings are wrong, a user could receive more access than intended.

Why it was flagged

The skill's permission model depends on user roles and session routing, with administrators receiving unrestricted workspace access.

Skill content
Use `Role` to determine sandbox configuration in `openclaw.json` ... Administrator: no sandbox, all tools allowed
Recommendation

Use precise session-to-user bindings, keep administrator sessions limited to trusted users, and test guest sessions to confirm they cannot access shared or private files.

What this means

Command execution is expected for a workspace, but a misconfigured bind mount or sandbox could let guest activity affect files outside the intended directory.

Why it was flagged

The guest configuration still permits file writes and command/process execution inside the sandboxed guest workspace.

Skill content
tools: { allow: ["read", "write", "edit", "exec", "process"], deny: ["browser", "canvas", "nodes", "cron", "gateway"] }
Recommendation

Keep guest bind mounts narrow, verify `workspaceAccess` and Docker bind settings, and deny `exec` or `process` for guests who do not need them.