OpenClaw Security Audit
Analysis
This appears to be a local defensive audit tool, but it reads, stores, and rewrites OpenClaw credentials while some documentation and metadata understate those effects.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
with open(env_file, 'w', encoding='utf-8') as f: ... with open(self.config_file, 'w', encoding='utf-8') as f: json.dump(config, f, indent=2, ensure_ascii=False)
The tool writes credential files and rewrites openclaw.json in place when hardening is run.
Create .env file with credentials ... This tool does NOT: ... Store or log actual credential values
The documentation both says the tool creates a .env file containing credentials and later claims it does not store actual credential values.
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
The skill handles credentials but has limited provenance information and no formal install specification.
script_content = f'''#!/bin/bash ... export "$name=$value" ...''' ... os.chmod(script_path, 0o755)
The tool generates executable shell or PowerShell setup scripts that load credentials into environment variables.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
credentials['FEISHU_APP_SECRET'] = feishu_config['appSecret'] ... credentials['OPENCLAW_GATEWAY_TOKEN'] = gateway_config['token'] ... lines.append(f"{key}={value}")The hardening tool extracts live service credentials from OpenClaw configuration and writes the actual values into a .env file.
