openclaw-cheatsheet
Analysis
This is mostly a documentation-only OpenClaw CLI cheatsheet, but it includes unexpected examples for running an unreviewed local Node script and creating a calendar event through an external tool.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
node ~/.openclaw/workspace-shared/scripts/discussion/discussion_runner.js --topic "주제" --mode live --rounds 3
The primary reference includes a live-mode command that executes a local Node script outside the package and outside the stated OpenClaw CLI cheatsheet scope.
gog calendar create iam@minhl.net --summary "퀵 호출" --from "2026-02-20T09:00:00+09:00" --to "2026-02-20T09:15:00+09:00"
The README provides a copy-paste example for an unrelated calendar tool with a fixed email/account target, which does not match the stated OpenClaw CLI reference purpose and mutates external account data.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`DISCORD_PANEL_WEBHOOK_URL` | 디스코드 웹훅 (에이전트 페르소나 전송)
The reference documents a Discord webhook URL, which is credential-like and can post to Discord if exposed or misused.
