Openclaw Skills

MaliciousAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: openclaw-skills Version: 1.0.0 The classification is **suspicious**. The skill bundle contains several components that, while not explicitly malicious in their stated intent, expose significant security vulnerabilities and high-risk capabilities. The most critical issues are: 1. **Shell Injection Vulnerabilities (RCE Risk)**: The `data-analyst-1.0.0/scripts/query.sh` script directly executes SQL queries using `sqlite3`, `psql`, and `mysql` commands, taking user-controlled input (`$DB_CONNECTION`, `$query`) without proper sanitization. This creates a direct shell injection vulnerability, allowing an attacker to execute arbitrary commands on the host system, leading to Remote Code Execution (RCE). Similar, though less direct, command injection risks exist in `project-orchestrator-0.1.0/scripts/query.sh` if the `$QUERY` parameter contains shell metacharacters. 2. **Sensitive Data Exposure and Hardcoded Paths**: The `openclaw-multi-brain-1.0.0/daemon/dual-brain-watcher.js` and `openclaw-multi-brain-1.0.0/hooks/dual-brain/handler.js` scripts contain hardcoded paths to sensitive files like `/Users/chadix/clawd/.kimi-api-key` and `/Users/chadix/clawd/MEMORY.md`. This is a significant information leakage vulnerability, as these files could contain API keys or other sensitive data that would then be sent to external LLMs (Moonshot/Kimi). Additionally, the `

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user expecting only process templates may install or expose a large bundle of unrelated code with powerful capabilities.

Why it was flagged

The artifact is presented as an instruction-only agent-team kit, but it ships many unrelated executable subtrees and sensitive-integration-looking helpers from an unknown source. That mismatch is a supply-chain/provenance concern even without proof that those files auto-run.

Skill content
Source: unknown ... No install spec — this is an instruction-only skill ... Code file presence 89 code file(s): desktop-control-1.0.0/__init__.py ... gmail-oauth-1.0.0/scripts/gmail-auth.sh ... mcp-ssh-manager-0.1.1/scripts/... openclaw-multi-brain-1.0.0/daemon/install.sh ... vercel-deploy-1.0.0/scripts/vercel_deploy.sh
Recommendation

Split unrelated skills into separate packages, disclose all bundled capabilities, provide provenance/homepage information, and remove code that is not needed for the stated team-process purpose.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

Agents could continue creating, selecting, and executing work while the user is not watching.

Why it was flagged

The skill explicitly instructs recurring autonomous operation and agent spawning without default human approval or clearly bounded authority.

Skill content
Proactive operation — The team runs itself via heartbeat ... If it's in Ready, any agent can pick it up. No approval needed. ... Team Health (run hourly) ... Spawn Scout ... The heartbeat keeps the loop spinning even when the human isn't watching.
Recommendation

Add explicit user approval gates for new work, define allowed task types, set stop conditions, and make heartbeat operation opt-in with clear pause/disable instructions.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

If loaded or invoked, the agent could operate the user's desktop, interact with active apps, and potentially expose sensitive typed content in logs.

Why it was flagged

The bundled desktop-control code can click, type, and capture screen state, defaults to no per-action approval, and logs typed text. This is a powerful local mutation capability that is not aligned with the top-level team-process purpose.

Skill content
def __init__(self, failsafe: bool = True, require_approval: bool = False) ... pyautogui.PAUSE = 0 ... def click ... pyautogui.click(...) ... def type_text ... pyautogui.write(text, interval=interval) ... logger.info(f"Typed text: '{text[:50]}
Recommendation

Do not bundle desktop automation with this process skill; if offered separately, require explicit opt-in, per-action approval for high-impact actions, and avoid logging typed user content.

What this means

A bad or untrusted queue entry could be reused as authoritative context and cause agents to execute unwanted work.

Why it was flagged

The shared Markdown process files become persistent operational memory that agents are told to trust for task selection, but the artifacts do not define writer trust, validation, or provenance controls.

Skill content
OPPORTUNITIES.md — Raw discoveries (anyone adds) ... BACKLOG.md — Triaged work queue ... STATUS.md — Who's working on what ... If it's in Ready, any agent can pick it up. No approval needed.
Recommendation

Restrict who can edit process files, record task provenance, require review before Ready status, and instruct agents to treat queue content as untrusted until validated.

What this means

Users and agents may over-trust the workflow and skip oversight for tasks that should require approval.

Why it was flagged

The wording discourages permission checks and asks the user to trust an autonomous workflow, without equally prominent safety limits or review requirements.

Skill content
❌ Waiting for permission to pick up work → Ready = fair game ... *The system runs itself. Your job is to trust it.*
Recommendation

Reword the guidance to emphasize user control, review for high-impact actions, and clear escalation rules instead of blanket trust.