Claw Audit

ReviewAudited by ClawScan on May 10, 2026.

Overview

Prompt-injection indicators were detected in the submitted artifacts (ignore-previous-instructions, you-are-now, system-prompt-override); human review is required before treating this skill as clean.

This skill looks purpose-aligned for local OpenClaw security auditing. Before installing, be comfortable with it running local Node/Bash scripts, reading OpenClaw configuration and .env-style files, and optionally changing config after confirmation. Use watch mode only when you want ongoing monitoring, and review auto-fix changes before approving them. ClawScan detected prompt-injection indicators (ignore-previous-instructions, you-are-now, system-prompt-override), so this skill requires review even though the model response was benign.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If approved, the skill may change local OpenClaw security settings.

Why it was flagged

The skill can run an auto-fix script that may change OpenClaw configuration, but the artifact instructs the agent to ask for confirmation first.

Skill content
### Auto-Fix ... `node scripts/auto-fix.mjs` ... **Always ask for confirmation before applying fixes.** Show what will change and let the user approve.
Recommendation

Review the proposed changes before approving auto-fix; prefer dry-run or manual review for important configurations.

What this means

The skill needs local access to configuration and credential-related files to report insecure storage.

Why it was flagged

The config auditor reads local .env files to detect known credential key names. The shown code reports presence/key names, not secret values.

Skill content
const envFile = join(stateDir, ".env"); ... const content = readFileSync(envFile, "utf-8"); ... `Plaintext credential found: ${key}`
Recommendation

Only run it in an environment where you are comfortable with a local audit tool inspecting OpenClaw config and .env files.

What this means

Watch mode may continue consuming resources and observing local skill/config changes until stopped.

Why it was flagged

The skill includes a long-running/background monitor, but it is disclosed and tied to user requests to watch or monitor.

Skill content
### Watch Mode ... `node scripts/watch.mjs` ... This runs in the background and alerts when new skills are installed or config changes.
Recommendation

Start watch mode only when you want ongoing monitoring, and stop the process when monitoring is no longer needed.

What this means

It may be harder to independently verify where the code came from or compare it with an upstream release.

Why it was flagged

The registry metadata does not provide a source repository or homepage, which weakens provenance for a tool that runs local audit scripts.

Skill content
Source: unknown; Homepage: none
Recommendation

Install only from a trusted registry entry, review the bundled files, and prefer a verified source repository when available.

What this means

Users might place too much confidence in the exact implementation claim.

Why it was flagged

Static scan snippets show some internal `execSync` template-literal command wrappers, so this safety guarantee is overstated even though the shown commands appear to run bundled scripts rather than user-provided commands.

Skill content
**No shell injection risk** — external processes use `spawnSync` with argument arrays, never template literals
Recommendation

Treat the README guarantee as imprecise; maintainers should update the wording or replace shell-string execSync calls with argument-array process execution.