Back to skill
Skillv1.0.0
ClawScan security
Agents-Manager-and-IM · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 9, 2026, 5:23 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The package mostly matches an agent-management tool but includes surprising/toxic elements (a hard-coded Operator token, shell execution of user-controlled messages, and file-system operations under ~/.openclaw) that increase risk and deserve caution.
- Guidance
- This package implements the claimed UI and local agent management, but exercise caution before installing: - Do not run it on a sensitive machine as-is. The server executes shell commands and can read/write/delete files under ~/.openclaw. That includes use of `rm -rf` and `openclaw` CLI invocations. - The repository contains a hard-coded openclawToken in server.js/config.json — treat that as a leaked secret. Confirm whether it is a dummy token; if it is real, rotate it and do not use the packaged value. Prefer configuring the gateway URL and token via secure environment variables rather than embedded constants. - The server inserts user-supplied message text directly into a shell command with only limited escaping, which can enable command injection (for example via $(...) or backticks). Before running, review/patch the code to avoid shell interpolation (use child_process.spawn with args array or an API that accepts input without shell interpretation) and validate/sanitize inputs. - If you still want to use this tool: run it in an isolated, non-privileged environment (container or dedicated VM), back up ~/.openclaw, and inspect/replace any embedded credentials. Prefer the version that reads tokens from a secure config or env, and remove/replace the hard-coded token. What would change this assessment: confirmation from the author that the token is intentionally dummy (and not usable), and proof that command execution paths have been rewritten to avoid shell interpolation (or a clear whitelist/sanitization). If those are provided, the tool looks much more coherent and lower-risk.
Review Dimensions
- Purpose & Capability
- noteFiles and runtime instructions implement an agent-management web UI and CLI and interact with an OpenClaw gateway and local agent workspaces — this is coherent with the stated purpose. However, the repository contains a hard-coded openclawToken in server.js and config.json instead of requiring it from environment/config, which is unexpected and unnecessary for a reusable skill.
- Instruction Scope
- concernRuntime code reads and writes files under the user's home (~/.openclaw), scans workspace-* directories, copies identity/soul files, and executes system commands (openclaw CLI, nc, rm -rf). The server executes shell commands that include user-supplied text (message) interpolated into a shell command with only minimal escaping of quotes/newlines — this creates command injection risk. These behaviors go beyond serving UI assets and are high-impact (file modification, deletion, and arbitrary command execution).
- Install Mechanism
- okThis is an instruction-only skill with source files included and no external download/install steps. No remote payloads are fetched at install time. Risk comes from what the shipped code does at runtime rather than from installer behavior.
- Credentials
- concernSKILL.md declares no required env vars, but the code embeds an openclawToken value and references an OpenClaw gateway URL. A legitimate manager would accept an operator token via configuration or env var; shipping a token in code is disproportionate and a credential-leak risk. The code also accesses many home-directory paths (~/.openclaw) which is plausible for this tool but amplifies the impact of any secret misuse or flaw.
- Persistence & Privilege
- notealways:false (no forced inclusion), and the skill does not request to persist itself in manager configuration. It does, however, write agent directories and a global agents.json under ~/.openclaw and exposes endpoints that can delete agent directories via rm -rf. Those write/delete privileges are expected for an agent manager but are dangerous if the code is exploited or improperly sandboxed.
