Workspace Audit
ReviewAudited by ClawScan on May 10, 2026.
Overview
The skill is mostly a transparent local workspace audit, but it can print credential-related lines from private files and enumerate 1Password item titles, so it deserves review before use.
Install only if you are comfortable with a local audit reading your OpenClaw workspace and optional 1Password item names. Prefer running it manually first, set OP_VAULT to a narrow vault, keep audit.conf trusted, and treat the output as sensitive because it may include credential-related lines.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A secret that the audit is supposed to find could be re-exposed to the agent session or saved in logs.
The script scans private workspace files and prints matching line content. A line such as an environment variable or API key assignment could include the secret value, causing it to enter the terminal, agent transcript, or logs.
cred_pattern = re.compile(r'(1Password|op item|API.?[Kk]ey|env[: ]|gateway env|OP_SERVICE)', re.IGNORECASE) ... print(f' ⚠️ {name}:{i+1} — credential-adjacent content: {line.strip()[:80]}')Redact matched values before printing, or print only filenames and line numbers. Run manually and avoid sharing full output if you suspect secrets are present.
1Password item names can reveal sensitive service or account metadata, even though the script does not retrieve secret field values.
When the 1Password CLI is authenticated and OP_VAULT is not set, the audit enumerates item titles from all accessible vaults.
VAULT="${OP_VAULT:-}" ... echo "🔒 Vault: (all vaults)" ... VAULT_ITEMS=$(op item list $VAULT_FLAG --format jsonSet OP_VAULT to the narrow vault you want audited, and only run this check with an account or service token that has appropriate limited access.
If an untrusted party can edit audit.conf, running the audit could execute their shell code.
The custom audit configuration is loaded with shell source, so a modified audit.conf can run shell commands, not just set limit variables.
if [ -f "$CONF" ]; then # shellcheck source=/dev/null source "$CONF" fi
Keep audit.conf trusted and limited to simple variable assignments, or change the script to parse expected keys instead of sourcing the file.
