Install untrusted source
- Finding
- Install source points to URL shortener or raw IP.
Security checks across static analysis, malware telemetry, and agentic risk
FlowClaw matches its stated workflow-automation purpose, but it deserves careful review because some integration examples omit API authentication and an opt-in mode can expose broad OpenClaw credentials to a persistent executor.
Install only if you want a persistent local workflow service and are comfortable reviewing its workflows. Keep WORKFLOW_EXECUTOR_API_KEY strong, keep HOST on 127.0.0.1 unless you know how to secure it, add API-key headers to n8n calls, leave FLOWCLAW_LOAD_OPENCLAW_CONFIG disabled by default, and review any workflow YAML or Python QA scripts before enabling automatic triggers.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A user following this example could create a workflow trigger path without the intended API-key protection, or may be tempted to weaken authentication to make the integration work.
This documented n8n node triggers workflow execution, but the example shows no API-key authentication for a high-impact endpoint that can start agent workflows.
"url": "http://localhost:8765/workflow/execute", "method": "POST", "authentication": "none"
Require and document an Authorization: Bearer or X-API-Key header for every /workflow/execute call, keep HOST set to 127.0.0.1 unless behind a trusted proxy, and do not disable the workflow executor API key.
If enabled, a persistent workflow service and its workflows may be able to access more OpenClaw credentials than the user intended.
The optional configuration can grant FlowClaw access to a broad local credential store, not just the workflow executor API key.
Set this to "true" to also load missing credentials from ~/.openclaw/openclaw.json. Only enable this if you understand that ALL credentials in your OpenClaw config become accessible to FlowClaw.
Leave FLOWCLAW_LOAD_OPENCLAW_CONFIG=false unless absolutely necessary. Prefer passing only the specific gateway token needed, use least-privilege credentials, and protect ~/.openclaw/openclaw.json with strict file permissions.
An untrusted workflow or QA script could run arbitrary Python with the user's local permissions and environment variables.
The skill can run workflow-associated Python scripts. This is expected for a workflow orchestrator, but it means workflow files and scripts are trusted execution inputs.
QA scripts are user-authored. FlowClaw validates that they are `.py` files within the workflow directory, but cannot sandbox their runtime behaviour. Only install workflows from sources you trust.
Review workflow YAML and any referenced scripts before running them. Use a virtual environment, consider a separate OS user or sandbox, and avoid exposing unnecessary secrets to the executor process.
Once started, FlowClaw may continue processing triggers until the service is stopped or disabled.
The executor is intended to stay running and respond to triggers over time. This is disclosed and fits the product purpose, but it is still persistent automation.
FlowClaw runs as a persistent service and handles the edge cases you'd rather not think about
Start the service only when needed, monitor logs, keep it bound to localhost, and know how to stop or unload the background service.
Dependency behavior can change over time, and a compromised or incompatible future package version could affect the executor.
The setup uses unpinned lower-bound dependency ranges, so future installs may resolve different package versions.
flask>=3.0.0 requests>=2.32.0 pyyaml>=6.0 gunicorn>=23.0.0
Install in a virtual environment, use a lockfile or pinned versions with hashes for production, and verify the skill source before running the service.
Task names, notes, workflow status, or other context may be shared with Notion, n8n, OpenClaw agents, and Discord depending on configuration.
The skill intentionally moves task context across multiple services and agents. This is purpose-aligned, but users should understand where task data goes.
Connects Notion → n8n → agents, with approval gates ... Reports progress via Discord notifications
Use least-privilege tokens, avoid putting highly sensitive data in workflow tasks, configure only the integrations you need, and verify channel/database destinations before enabling automation.