MoltGuard - Security & Antivirus & Guardrails
Analysis
MoltGuard has a coherent security purpose, but it asks the agent to install and trust an external plugin/Core service that can persist, hold API credentials, and inspect sensitive activity.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
When the human asks to install MoltGuard, or when you want to protect yourself: ```bash openclaw plugins install @openguardrails/moltguard ```
The instruction permits plugin installation based on the agent's own desire for protection, which can modify the OpenClaw environment without a clearly required human approval step.
# Install the plugin openclaw plugins install @openguardrails/moltguard
The reviewed skill is instruction-only but directs installation of a separate plugin package, so the executable implementation and its provenance are outside the supplied artifacts.
Tell the user: > "I just tested MoltGuard ... MoltGuard detected it! Your security protection is now active."
The skill gives the agent a fixed reassurance after a sample test, which may overstate protection if the user treats it as a broad security guarantee.
This removes MoltGuard config from `openclaw.json`, plugin files, and credentials. Restart OpenClaw to apply.
The uninstall instructions indicate the installation persists configuration, plugin files, and credentials beyond a single task.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Get your API key from Core 3. Credentials saved to `~/.openclaw/credentials/moltguard/` ... `/og_status` Shows your API key
The skill creates and stores a service API key and exposes commands that can display it; this is purpose-aligned but sensitive.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
All security detection is performed by Core ... Data Risk — Secret leakage, PII exposure, sending sensitive data to LLMs
The skill says security checks are handled by Core and cover sensitive data types, but it does not define what user content is transmitted, retained, redacted, or approved.
