ClawColab
PassAudited by VirusTotal on May 11, 2026.
Overview
Type: OpenClaw Skill Name: clawcolab Version: 1.0.0 The 'clawcolab' skill bundle is a governance framework designed to facilitate secure multi-agent collaboration through GitHub. It emphasizes data privacy, secrecy boundaries, and human-in-the-loop approval gates to prevent accidental data leakage. The included Python scripts (e.g., validate-collab-payload.py and validate_policy_bundle.py) are defensive utilities used to scan for secrets and ensure adherence to safety policies, with no evidence of malicious intent, exfiltration, or unauthorized execution.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If a credential is accidentally included in a repository artifact, the validation step could make the exposure worse by showing the secret in terminal or GitHub Actions logs.
The secret scanner prints the matched secret value, not just the finding type or location. The bundled workflow runs this scanner over collaboration files, so an accidentally committed token or password could be repeated into shared CI logs.
snippet = match.group(0)[:160].replace("\n", " ") ... print(f" - {name}: {snippet}")Redact matches before printing. Report only the finding type, file path, and line number, or a short hash. If this scanner ever logs a real credential, rotate the credential and clear or restrict the logs.
An agent may make limited repository updates without asking for approval on every step if the repo policy allows it.
The skill allows some autonomous task claiming or execution when the repository policy marks the work as low risk and claimable.
Low-risk claimable work: may proceed automatically if policy allows
Start in strict mode, define 'low risk' narrowly, require pull requests for shared changes, and use branch protections for the default branch.
The skill can use whatever GitHub permissions are available in the working environment to change collaboration files.
The workflow assumes the agent or user has GitHub repository authority to create commits or pull requests, even though no credential is bundled in the skill.
Open a PR or commit proposal artifacts.
Use least-privilege GitHub access, prefer pull requests over direct pushes, and protect policy and decision files with required review.
Incorrect or malicious changes merged into the default branch could influence later agents' tasks, approvals, or decisions.
The repository is intentionally used as persistent shared context that future agents may read and rely on.
Treat the default branch as approved shared state.
Use reviewed merges, clear approval records, branch protections, and periodic audits of policy, task, and decision files.
