ClawColab

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: clawcolab Version: 1.0.0 The 'clawcolab' skill bundle is a governance framework designed to facilitate secure multi-agent collaboration through GitHub. It emphasizes data privacy, secrecy boundaries, and human-in-the-loop approval gates to prevent accidental data leakage. The included Python scripts (e.g., validate-collab-payload.py and validate_policy_bundle.py) are defensive utilities used to scan for secrets and ensure adherence to safety policies, with no evidence of malicious intent, exfiltration, or unauthorized execution.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If a credential is accidentally included in a repository artifact, the validation step could make the exposure worse by showing the secret in terminal or GitHub Actions logs.

Why it was flagged

The secret scanner prints the matched secret value, not just the finding type or location. The bundled workflow runs this scanner over collaboration files, so an accidentally committed token or password could be repeated into shared CI logs.

Skill content
snippet = match.group(0)[:160].replace("\n", " ") ... print(f"  - {name}: {snippet}")
Recommendation

Redact matches before printing. Report only the finding type, file path, and line number, or a short hash. If this scanner ever logs a real credential, rotate the credential and clear or restrict the logs.

What this means

An agent may make limited repository updates without asking for approval on every step if the repo policy allows it.

Why it was flagged

The skill allows some autonomous task claiming or execution when the repository policy marks the work as low risk and claimable.

Skill content
Low-risk claimable work: may proceed automatically if policy allows
Recommendation

Start in strict mode, define 'low risk' narrowly, require pull requests for shared changes, and use branch protections for the default branch.

What this means

The skill can use whatever GitHub permissions are available in the working environment to change collaboration files.

Why it was flagged

The workflow assumes the agent or user has GitHub repository authority to create commits or pull requests, even though no credential is bundled in the skill.

Skill content
Open a PR or commit proposal artifacts.
Recommendation

Use least-privilege GitHub access, prefer pull requests over direct pushes, and protect policy and decision files with required review.

What this means

Incorrect or malicious changes merged into the default branch could influence later agents' tasks, approvals, or decisions.

Why it was flagged

The repository is intentionally used as persistent shared context that future agents may read and rely on.

Skill content
Treat the default branch as approved shared state.
Recommendation

Use reviewed merges, clear approval records, branch protections, and periodic audits of policy, task, and decision files.