Pywayne Bin Cmdlogger

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: cmdlogger Version: 0.1.0 The `cmdlogger` skill, as described in `SKILL.md`, is designed to execute arbitrary commands and log all their I/O (stdin, stdout, stderr) to a file. A critical note in `SKILL.md` explicitly warns that 'User input (including passwords) is logged' for interactive commands. Combined with the ability to specify an arbitrary `--log-path`, this creates a significant vulnerability where an AI agent, if subjected to prompt injection, could be coerced into logging sensitive credentials or other data to a potentially insecure location, enabling data exfiltration. While the skill's stated purpose is benign, its inherent capability to capture and store sensitive data makes it highly susceptible to malicious exploitation.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on a destructive or account-changing command, the logger will still execute that command while recording its I/O.

Why it was flagged

The skill is designed to execute arbitrary user-supplied commands. This is purpose-aligned for a command logger, but broad command execution can affect files, systems, or accounts depending on the command chosen.

Skill content
`cmdlogger <command> [args...]` and `command | The command to execute`
Recommendation

Use it only for commands the user has explicitly requested, and review commands that deploy, delete, publish, or modify important data before running them.

What this means

The behavior depends on whatever `cmdlogger` executable is present in the user's environment, which may not be the one the user expects.

Why it was flagged

The documentation relies on a `cmdlogger` executable, while the provided package is instruction-only and does not include an install spec or declared binary requirement.

Skill content
`cmdlogger --log-path <log_path> <command> [args...]`
Recommendation

Confirm the installed `cmdlogger` binary and its source before using this skill, especially on sensitive commands.

What this means

Passwords, tokens, private command output, or debugging data may remain on disk in the log file after the command finishes.

Why it was flagged

The skill intentionally persists full stdin, stdout, and stderr to a log file, including potentially sensitive interactive input.

Skill content
`User input (including passwords) is logged. Be careful with sensitive information.`
Recommendation

Avoid using it for password prompts or secret-bearing commands, choose log paths carefully, restrict log file access, and delete or redact logs when no longer needed.