Clawdbot Security Check

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches a Clawdbot security-audit purpose, but it claims to be read-only while documenting fix commands that can change settings and expose credentials.

Review this skill carefully before installing. Use it only if you are comfortable with Clawdbot reading its local configuration and credential-related paths. Avoid the documented --fix mode unless you have backups and the agent shows exactly what it will change. Ask the agent to redact tokens and secrets from any audit output.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may trust the audit as read-only and then run a documented command that changes their Clawdbot settings or file permissions.

Why it was flagged

The same artifact tells users the skill never modifies configuration while also documenting a mode that modifies configuration and permissions.

Skill content
“100% Read-only - Only audits; never modifies configuration” ... “The `--fix` flag applies these guardrails: - Changes `groupPolicy` ... - Resets `logging.redactSensitive` ... - Tightens permissions...”
Recommendation

Remove the read-only claim or remove the fix mode. If fixes remain, clearly label them as mutating, require explicit user confirmation, show a diff, and provide backup or rollback steps.

What this means

The agent could be guided to run shell-based remediation commands that persistently alter local Clawdbot behavior.

Why it was flagged

The skill requests shell execution capability and documents a mutating fix path, which is not adequately scoped by the read-only safety framing.

Skill content
“requires":{"files":["read"],"tools":["exec","bash"]}” ... “clawdbot security audit --fix — Apply guardrail remediations”
Recommendation

Constrain the skill to read-only commands by default. Put all shell-based fixes behind explicit user approval, exact command preview, and documented scope.

What this means

Secrets or authentication-related configuration could appear in the conversation, logs, or audit output.

Why it was flagged

The audit targets local credential and auth-profile locations, and the environment-variable check can print the actual gateway token value rather than only verifying that it exists.

Skill content
“env | grep CLAWDBOT_GATEWAY_TOKEN” ... “Auth profiles | `~/.clawdbot/agents/{agentId}/auth-profiles.json`”
Recommendation

Use presence checks that do not print secret values, redact tokens by default, and ask the user before reading any credential or auth-profile file.

What this means

If a user expects npm-style scripts to run, the referenced code is not available for review in this artifact set.

Why it was flagged

The package metadata references a JavaScript entrypoint that is not present in the supplied files, creating an inconsistency even though the registry describes this as instruction-only.

Skill content
“scripts": { "start": "node security-check.js", "start:json": "node security-check.js --json" }
Recommendation

Remove unused script entries or include and review the referenced file so the package contents match the declared behavior.