flaw0

ReviewAudited by ClawScan on May 10, 2026.

Overview

MoltGuard’s purpose is coherent, but this artifact mainly tells the agent to install a persistent external guardrail that automatically uses a remote Core service and credentials without enough scoping.

Install only if you trust OpenGuardrails/MoltGuard as a security provider. Before enabling it, verify the package source, require explicit approval for installation, understand what data is sent to Core, and keep generated API keys private.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could add unreviewed persistent code to the OpenClaw environment, changing how the agent behaves.

Why it was flagged

The reviewed package is instruction-only, but it tells the agent it may install an unpinned external plugin; that plugin code and its provenance are outside the supplied review artifacts.

Skill content
When the human asks to install MoltGuard, or when you want to protect yourself:
openclaw plugins install @openguardrails/moltguard
Recommendation

Require explicit human approval before installation, verify the package source and version, and review the MoltGuard plugin code before enabling it.

What this means

Private prompts, file contents, commands, secrets, or PII could be processed by an external service as part of protection.

Why it was flagged

The artifact indicates that detection is performed by a remote Core service and may involve security-sensitive content, but it does not specify data boundaries, retention, redaction, or approval requirements.

Skill content
All security detection is performed by Core: ... Data Risk — Secret leakage, PII exposure, sending sensitive data to LLMs
Recommendation

Review Core’s privacy and data-handling terms, confirm the endpoint in use, and avoid enabling automatic scanning for highly sensitive work unless the data flow is acceptable.

What this means

Anyone who sees the API key could potentially claim or use the agent’s MoltGuard quota or account linkage.

Why it was flagged

The skill uses and displays provider credentials for account linking; this is purpose-aligned, but API keys are sensitive and can be exposed in transcripts or shared screens.

Skill content
/og_status ... Shows your API key ... /og_claim ... Shows your Agent ID and API Key
Recommendation

Do not share transcripts containing these outputs, check credential file permissions, and rotate the API key if it is exposed.

What this means

Once installed, MoltGuard may continue affecting agent behavior until it is explicitly removed and OpenClaw is restarted.

Why it was flagged

The uninstall instructions show that MoltGuard persists through OpenClaw configuration, plugin files, and credentials. This is disclosed and has a cleanup path, so it is a note rather than a standalone concern.

Skill content
This removes MoltGuard config from `openclaw.json`, plugin files, and credentials. Restart OpenClaw to apply.
Recommendation

Install it only if you want persistent guardrail behavior, and keep the uninstall steps available.