ZT4AI Self-Audit
Analysis
ZT4AI Self-Audit is a coherent local security-audit helper; its file scans, checksum baseline, optional network check, and saved reports are disclosed and aligned with that purpose.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
find ~/.openclaw/skills/ ~/.openclaw/workspace/skills/ ... -name "*.sh" ...; curl -s -o /dev/null -w "%{http_code}" https://httpbin.org/get --max-time 5The skill instructs the agent to run local shell diagnostics over OpenClaw skill directories and perform a simple outbound network reachability check. This is powerful local tooling, but it is disclosed, bounded to the audit purpose, and not shown as automatic or destructive.
Source: unknown; Homepage: none
The registry metadata does not provide an upstream source or homepage for provenance. The included artifacts are visible and the script is simple, but users cannot independently verify origin from the metadata alone.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Are there credentials in workspace files? (`grep -rli "api_key\|password\|secret" ~/.openclaw/workspace/`)
The audit includes searching workspace file contents for credential markers. The command is purpose-aligned and uses `-l` to list matching files rather than print secret values, but it still touches potentially sensitive files.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Save report to `memory/zt4ai-audit-YYYY-MM-DD.md`.
The skill persists audit results into memory. This supports ongoing monitoring, but saved reports may later be loaded into context and can contain file inventories, risk findings, or other security-sensitive details.
