Qclaw Env

PassAudited by VirusTotal on May 10, 2026.

Overview

Type: OpenClaw Skill Name: qclaw-env Version: 1.0.0 The qclaw-env skill bundle is a comprehensive environment diagnostic and installation tool for macOS and Windows. It possesses high-risk capabilities including checking for passwordless sudo access (sudo -n true), executing remote scripts via 'curl | bash' and 'Invoke-Expression' (PowerShell), installing system-level packages (.pkg, .msi), and modifying shell configuration files (~/.zshrc, ~/.zprofile). While these actions are clearly aligned with the stated purpose of setting up development environments and the bundle utilizes reputable mirror sources (e.g., USTC, Tsinghua, Huawei Cloud), the broad system-level access and the execution of remote payloads constitute significant security risks. No evidence of intentional malice or data exfiltration was found, but the tool's design allows for arbitrary code execution and system modification (SKILL.md, install-macos.md, install-windows.md).

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

An agent following the manual could remove Homebrew and all Homebrew-installed tools on an Apple Silicon Mac, breaking the user’s development environment.

Why it was flagged

The provided static scan reports this destructive delete command appears in the macOS manual without an explicit confirmation gate. It can delete the entire Homebrew installation rather than a single target tool.

Skill content
rm -rf /opt/homebrew  # Apple Silicon
Recommendation

Do not allow this command to run automatically. Require explicit user confirmation, explain the impact, verify the exact path, and prefer official uninstall or repair steps.

What this means

If the remote installer or mirror is compromised or changes unexpectedly, the installation step could run unintended code.

Why it was flagged

The guide executes an unpinned remote PowerShell installer from a mirror. This is common for package-manager bootstrap, but it trusts the remote source at run time.

Skill content
irm https://gitee.com/glsnames/scoop-installer/raw/master/bin/install.ps1 | iex
Recommendation

Prefer official sources when possible, review installer scripts, and verify checksums or signatures before running remote script pipelines.

What this means

Exposed or overly broad API keys could allow account use, data access, or unexpected charges.

Why it was flagged

The skill may guide users to configure provider API keys as environment variables. That is purpose-aligned for CLI setup, but those keys can grant account access.

Skill content
配置 API Key、环境变量、PATH ... 第 4 层 环境变量 OPENAI_API_KEY / GEMINI_API_KEY / ...
Recommendation

Only configure keys for services you intend to use, use least-privilege and revocable keys, avoid pasting secrets into logs or chat, and rotate keys if exposed.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

Future shells and installs may continue using modified PATH, mirror, proxy, or registry settings even after the immediate task is complete.

Why it was flagged

The manual persists shell and package-manager configuration changes that will affect future terminal sessions and future package installs.

Skill content
cat >> ~/.zshrc ... export HOMEBREW_BREW_GIT_REMOTE=...; echo 'eval "$(/opt/homebrew/bin/brew shellenv)"' >> ~/.zprofile
Recommendation

Tell the user exactly which profile/config files were changed and provide simple rollback commands.