OpenClaw Elite Watcher
Analysis
The skill advertises real-time OpenClaw monitoring, but the included code only writes a hard-coded, unsupported report to a specific local workspace path.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
f.write("- **[系統]**:成功切換至 Intel Agent 模式,全面追蹤核心開發者動態。\n")The code generates a report asserting successful core-developer tracking, while the artifacts show no actual repository, profile, or X monitoring logic despite the SKILL.md advertising real-time monitoring.
REPORT_PATH = "/Users/asdc163/.openclaw/workspace/intel_reports"
The script creates and writes reports to a hard-coded, user-specific absolute path that is not disclosed in the skill metadata or SKILL.md usage instructions.
import requests
The included Python file imports a third-party package, but the package has no install spec or dependency declaration; this is a packaging/provenance gap rather than direct evidence of malicious behavior.
