Trent OpenClaw Security Assessment

ReviewAudited by ClawScan on May 15, 2026.

Overview

This skill appears purpose-aligned for a Trent security audit, but it intentionally sends redacted OpenClaw configuration and user-approved skill source packages to Trent.

Install only if you are comfortable sharing redacted OpenClaw configuration details and selected skill source packages with Trent. Before running, verify TRENT_API_KEY and any TRENT_*_API_URL or OPENCLAW_WORKSPACE overrides, review the Phase 2 preview carefully, and remember that custom secret formats may not be fully redacted.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill runs local audit code on your machine when invoked.

Why it was flagged

The skill asks the agent/user to run bundled Python snippets locally. This is expected for the audit workflow and no unrelated install or destructive command is shown.

Skill content
PYTHONPATH="{baseDir}/scripts:${PYTHONPATH:-}" python3 - <<'PY'
Recommendation

Run the phases intentionally and review the commands before executing them.

What this means

Your Trent API key is used to call Trent services.

Why it was flagged

The skill authenticates to Trent using TRENT_API_KEY, which is expected for the service integration.

Skill content
auth_header = _get_auth_header(); headers = {"Authorization": auth_header, "Content-Type": "application/json", "Accept": "text/event-stream"}
Recommendation

Use a scoped Trent API key if available and rotate it if you suspect it was exposed.

What this means

If TRENT_CHAT_API_URL or TRENT_AGENT_API_URL is set incorrectly, audit data and the Trent API key could be sent to an unintended endpoint.

Why it was flagged

The API destination can be overridden by environment variables, and the API key is then sent to that configured endpoint. This may be useful for trusted enterprise/test endpoints but should be deliberate.

Skill content
return os.environ.get("TRENT_CHAT_API_URL") or _DEFAULT_CHAT_URL
Recommendation

Before running, verify TRENT_CHAT_API_URL and TRENT_AGENT_API_URL are unset or point only to a trusted Trent-controlled endpoint.

What this means

Information about your OpenClaw configuration, installed skills, workspace markers, and file permissions may be shared with Trent.

Why it was flagged

Phase 1 sends redacted OpenClaw configuration metadata to Trent. This is central to the audit purpose and the code includes local secret redaction.

Skill content
Collect metadata and send to Trent for analysis
Recommendation

Review what configuration metadata is collected and avoid running the audit if you cannot share deployment details with Trent.

What this means

Your skill source code and metadata may leave your machine for Trent analysis after you approve the upload.

Why it was flagged

Phase 2 can upload skill source packages for remote analysis, but the instructions disclose the upload, require a preview, and require user confirmation.

Skill content
Before upload, each skill is packaged with its source code and metadata ... Files like .env, .pem, .key, and .db are excluded, and secrets in standard formats ... are automatically redacted locally.
Recommendation

Inspect the skill list before approving upload, and keep custom or unusual secrets out of source files because redaction may not catch every format.