Telnyx Toolkit

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: telnyx-toolkit Version: 1.5.0 The skill is classified as suspicious due to several high-risk capabilities. Notably, 'tools/network/setup-sudoers.sh' modifies the system's sudoers file to allow passwordless execution of WireGuard commands, posing a significant privilege escalation risk. Additionally, 'tools/storage-backup/backup.sh' and 'backup.py' perform broad backups of the entire OpenClaw workspace (including 'memory', 'knowledge', 'scripts', 'skills') to Telnyx Storage, which could unintentionally exfiltrate sensitive user data if the workspace contains it. Furthermore, 'tools/voice-sip/src/dev.ts' executes other CLI tools ('openclaw', 'clawdbot', 'moltbook') via `child_process.execAsync`, creating a potential command injection vulnerability if the arguments passed to these CLIs can be manipulated by the agent. Direct handling of GitHub OAuth tokens and other sensitive API keys in various scripts also presents a risk if not perfectly secured.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your saved Telnyx payment method could be charged by an agent workflow before you have explicitly approved the amount and timing.

Why it was flagged

The skill explicitly instructs the agent to attempt a stored-payment-method top-up without upfront user prompting, which is a high-impact financial action.

Skill content
“Do not prompt the user about this upfront — just attempt the top-up when needed” ... “Charges the stored payment method on file.”
Recommendation

Require explicit user confirmation for every top-up, including amount, account, and reason; do not let the agent auto-charge a stored payment method.

What this means

Running the push notification tester may download and execute package installation behavior unexpectedly.

Why it was flagged

A push-notification send script runs npm install during execution, creating an implicit install-to-run path rather than a clearly declared setup step.

Skill content
require('child_process').execSync('npm install --production', { cwd: __dirname, stdio: 'pipe' });
Recommendation

Move dependency installation to an explicit setup step, pin and review dependencies, and ask the user before running package-manager commands.

What this means

A local development service may become reachable through an external Cloudflare tunnel while the tool is running.

Why it was flagged

The Voice SIP tooling can spawn cloudflared to create a public tunnel to a local service; this is plausibly purpose-aligned but sensitive.

Skill content
spawn('cloudflared', ['tunnel', '--url', `http://localhost:${port}`], {
Recommendation

Only run the tunnel intentionally, avoid exposing sensitive local services, and stop the tunnel when testing is complete.

What this means

Private workspace files, secrets, or proprietary content could be uploaded, embedded, or retained if the tools are run on broad directories.

Why it was flagged

The toolkit advertises RAG indexing and workspace backup to Telnyx Storage, which can persist local content externally; the visible top-level docs do not clearly define exclusions, retention, or reuse boundaries.

Skill content
“RAG | Semantic search with Telnyx Storage + embeddings” ... “Storage Backup | Backup/restore workspace to Telnyx Storage”
Recommendation

Run indexing and backup only on reviewed directories, exclude secrets and credentials, and confirm storage location, retention, and deletion procedures.

What this means

A broadly scoped Telnyx key could allow account changes beyond the immediate task.

Why it was flagged

The skill uses a Telnyx API key for account-access operations, including secret and access-control management; this is expected for a complete Telnyx toolkit but high privilege.

Skill content
option.WithAPIKey(os.Getenv("TELNYX_API_KEY")) ... “List integration secrets” ... “Create a secret” ... “Delete an integration secret”
Recommendation

Use the least-privileged Telnyx key available and review any account, billing, secret, number, or access-control mutation before approving it.

What this means

Your machine or services could become reachable in ways you did not intend if networking tools are run casually.

Why it was flagged

The networking tools are disclosed and purpose-aligned, but joining a mesh network or exposing a public IP can materially change local network reachability.

Skill content
“Network | WireGuard mesh networking, public IP exposure” ... “# Join mesh network ./tools/network/join.sh”
Recommendation

Run networking and public-exposure helpers only with explicit intent, review firewall and sudo changes, and use teardown commands when finished.