Coverify

Security checks across static analysis, malware telemetry, and agentic risk

Overview

Coverify appears to be a benign local text-analysis tool, but it runs bundled Python scripts and may save extracted snippets from your inputs in local OpenClaw folders.

This skill is reasonable to install if you want a local heuristic verifier for commitment-token drift. Before installing, be aware that it runs bundled Python scripts, stores model-swap reports locally, and its “proof” or “cryptographic score” language should not be treated as a standalone safety guarantee.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You are installing and running bundled local scripts from a package whose registry provenance is limited.

Why it was flagged

Runnable Python code is included even though the registry lacks a source/homepage and install specification. The scripts are visible and purpose-aligned, so this is a provenance/declaration note.

Skill content
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill ... Code file presence: 2 code file(s): scripts/commitment_verify.py, scripts/model_swap_test.py
Recommendation

Review the included scripts before relying on the skill, especially if using it in automated governance or research workflows.

What this means

Running the model-swap command executes local Python code from the skill package.

Why it was flagged

The model-swap workflow runs another bundled Python script. It uses an argument list rather than a shell and is central to the stated purpose, so this is expected local execution.

Skill content
subprocess.run([sys.executable, os.path.join(SCRIPTS_DIR, "commitment_verify.py"), "extract", signal], capture_output=True, text=True)
Recommendation

Run it only in contexts where local Python execution is acceptable, and keep inputs user-directed.

What this means

Sensitive input text may leave derived snippets in local result files under ~/.openclaw.

Why it was flagged

The script persists model-swap reports containing extracted kernels from the provided signal and external kernel input. Those kernels can include commitment-bearing sentences from sensitive text.

Skill content
RESULTS_DIR = os.path.expanduser("~/.openclaw/governance/model_swap_tests") ... "local_kernel": sorted(local_kernel), "other_kernel": sorted(other_kernel) ... with open(fpath, "w")
Recommendation

Avoid using highly sensitive text unless you are comfortable with derived kernels being stored locally, or delete the saved reports after use.

What this means

A user might give the tool’s verdict more authority than the implementation warrants.

Why it was flagged

The wording could encourage users or agents to over-trust the output. The artifacts otherwise describe regex/Jaccard-style commitment comparison, so results should be treated as heuristic evidence rather than absolute proof.

Skill content
Install it, run it on any signal, get a cryptographic score. No governance harness required.
Recommendation

Use the results as an advisory signal and validate important governance or safety decisions with additional review.