file-sender

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill mostly matches its file-delivery purpose, but it can proactively send workspace files without explicit user confirmation and has a weak workspace-boundary check.

Review this skill before installing. It appears designed for legitimate file delivery, but you should confirm each package before sending, avoid selecting broad directories that may contain secrets, and periodically clean `.file-outbox/` if sensitive files are delivered.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Files from the workspace may be packaged and delivered through the Manager even when the user did not specifically request a download, increasing the chance of accidental disclosure of unintended files.

Why it was flagged

The skill instructs autonomous file-delivery behavior without requiring explicit user approval for each send.

Skill content
Even if the user doesn't explicitly ask for file delivery, you should proactively trigger this skill whenever you generate deliverable artifacts in the workspace.
Recommendation

Require explicit user confirmation before each delivery, especially for directories, and show the exact path and intended contents before sending.

What this means

If similarly named sibling directories exist, the agent could package and deliver files outside the documented workspace boundary.

Why it was flagged

The validation uses a raw prefix match, so a path like /home/node/workspace_backup would pass even though it is outside the intended workspace directory.

Skill content
WORKSPACE_PREFIX="/home/node/workspace"
[[ "$REAL_PATH" != "$WORKSPACE_PREFIX"* ]] && { echo "❌ 仅允许 $WORKSPACE_PREFIX 下的文件"; exit 1; }
Recommendation

Use a path-boundary check such as allowing only the exact workspace path or paths beginning with /home/node/workspace/, and keep the documentation aligned with that behavior.

What this means

The skill needs a Manager-issued token to register file deliveries. The artifacts do not show hardcoded credentials or unrelated token use.

Why it was flagged

The script uses an instance-specific bearer token to notify the Manager; this is expected for the stated delivery workflow, but it is still delegated authority.

Skill content
-H "Authorization: Bearer ${OPENCLAW_FILE_PUSH_TOKEN}"
Recommendation

Ensure the token is scoped only to file delivery for this instance and that the registry metadata accurately declares the required environment variables.

What this means

Sensitive files included in a delivery may remain stored in the workspace outbox after the user receives them.

Why it was flagged

Delivered archives and descriptions remain on disk after packaging, which can retain sensitive content beyond the immediate task.

Skill content
Files are persisted locally to `.file-outbox/` first — even if notification fails, the files are safe.
Recommendation

Review and clean `.file-outbox/` when deliveries contain sensitive material, or add a documented retention/cleanup policy.

What this means

The delivery flow relies on Manager infrastructure to retrieve and forward the ZIP, so file contents pass through that service path.

Why it was flagged

File contents are ultimately transferred through the Manager/Agent delivery path, which is purpose-aligned but should be visible to users.

Skill content
Manager pulls — Manager's background task pulls the ZIP from the Agent and forwards it
Recommendation

Install only if you are comfortable with Manager-mediated file delivery, and verify the Manager URL is trusted and controlled by the expected OpenClaw environment.