Audos – Launch a Startup Via OpenClaw in 10 Minutes

WarnAudited by ClawScan on May 10, 2026.

Overview

The Audos skill is mostly a disclosed external-service integration, but it asks the agent to persist non-expiring account tokens by email and skip OTP for returning users, which creates long-lived account-access risk.

Use this only if you are comfortable sending your email and startup idea to Audos and having it create a live workspace/landing page. Before using returning-user features, ask how auth tokens are stored and deleted, avoid saving tokens in ordinary chat memory, and do not run the helper scripts or change AUDOS_BASE_URL unless you trust the source and endpoint.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Audos will receive the user's email and business idea and may create live public startup assets.

Why it was flagged

The agent is instructed to call an external API that creates and monitors a live Audos workspace/landing page. This is purpose-aligned, but it mutates third-party state and sends user-provided business/account data outside OpenClaw.

Skill content
Collect user's email + business idea ... Verify → POST /verify with OTP code → returns `authToken` + starts build ... Watch for `landingPageReady: true`
Recommendation

Confirm the user wants an Audos workspace and understands that a live landing page/workspace may be created before starting the flow.

What this means

An agent or session with a stored token could retain long-term access to the user's Audos workspace and related business data.

Why it was flagged

The workflow grants and reuses long-lived Audos account access, and the returning-user flow appears to skip verification. The artifacts do not clearly bound who can reuse the token, where it is stored, or how access is revoked.

Skill content
Auth tokens never expire — store persistently by email ... Response includes `auth_token` + `urls` directly — skip OTP!
Recommendation

Require explicit user consent for token reuse, store tokens only in a secure scoped credential store, document revocation/deletion, and avoid skipping verification unless the user has approved that behavior.

What this means

Long-lived Audos tokens could be exposed through logs, memory, shared context, or accidental reuse later.

Why it was flagged

This directly instructs persistent storage of sensitive credentials keyed by email, but the artifacts do not define retention, deletion, isolation from chat context, or protection against unintended reuse across tasks.

Skill content
Auth tokens never expire — store persistently by email
Recommendation

Do not store auth tokens in general agent memory or chat context. Use a secure credential vault with clear user controls, expiry where possible, and a way to delete saved access.

What this means

It may be harder to verify the origin of the helper scripts or the intended installation environment.

Why it was flagged

The skill does not show automatic install execution, but provenance metadata is limited. The package includes helper scripts, so users have less registry-level source context when deciding whether to run them.

Skill content
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill.
Recommendation

Review the included scripts before running them, install only from a trusted source, and verify any referenced project repository independently.