MoltGuard - Security & Antivirus & Guardrails

ReviewAudited by ClawScan on May 10, 2026.

Overview

MoltGuard appears to be a security tool, but its instructions encourage installing and activating an external plugin with automatic cloud-backed scanning and credential creation without enough reviewable scope or user-control detail.

Treat this as a review-before-install skill. Its security purpose is plausible, but only install it after you intentionally approve the external plugin, understand what data Core receives, and are comfortable with automatic credential creation and persistent OpenClaw configuration changes.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing the skill could lead the agent to fetch and activate additional unreviewed plugin code that changes OpenClaw behavior.

Why it was flagged

The reviewed package is instruction-only, yet it directs the agent to install a separate plugin package. The wording also permits installation based on the agent's own judgment, not only an explicit user request.

Skill content
When the human asks to install MoltGuard, or when you want to protect yourself:

openclaw plugins install @openguardrails/moltguard
Recommendation

Install only after the user explicitly approves the plugin package and reviews its source, install source, and permissions.

What this means

Sensitive prompts, file/web content, commands, or PII may be sent to the provider's Core service for analysis.

Why it was flagged

The skill discloses that an external Core service performs detection over prompts, behavior, commands, PII, and secret-leakage risks, but the artifact does not define data boundaries, retention, exclusions, or when content is transmitted.

Skill content
All security detection is performed by Core:

Core Risk Surfaces:
1. Prompt / Instruction Risk ...
2. Behavioral Risk — Dangerous commands, file deletion, risky API calls
3. Data Risk — Secret leakage, PII exposure, sending sensitive data to LLMs
Recommendation

Before enabling, verify the provider's data handling terms and confirm what content is sent, logged, retained, or excluded.

What this means

A local API key will be created and stored for MoltGuard, and compromise of that credential could affect the linked service account or quota.

Why it was flagged

The skill creates and stores a provider API key locally. This is purpose-aligned for an account-backed security service, but it is sensitive credential handling that users should notice.

Skill content
Get your API key from Core
Credentials saved to `~/.openclaw/credentials/moltguard/`
Recommendation

Protect the local credentials directory, avoid sharing command output that reveals API keys, and rotate the key if it is exposed.

ConcernMedium Confidence
ASI10: Rogue Agents
What this means

The agent may activate persistent security monitoring and provider credentials without a clear approval checkpoint.

Why it was flagged

The onboarding flow describes installation, credential acquisition, credential storage, and activation without human intervention, which is high-impact persistence and account setup for an agent security component.

Skill content
Automatic (Zero Human Intervention)

1. MoltGuard installs
2. Get your API key from Core
3. Credentials saved to `~/.openclaw/credentials/moltguard/`
4. Protection active
Recommendation

Require explicit user confirmation before install, account/key creation, persistent configuration changes, or activation.