Rag

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: openclaw-rag-skill Version: 1.0.6 The skill is classified as suspicious primarily due to a significant prompt injection vulnerability identified in `launch_rag_agent.sh` and `rag_agent.py`. These scripts directly embed user input into Python commands and LLM prompts without explicit sanitization, allowing a malicious user to potentially manipulate the AI agent's behavior. Additionally, the `scripts/moltbook_post.py` file introduces an optional outbound network call to `https://www.moltbook.com/api/v1/posts` for posting announcements. While this feature is optional, requires an API key, and is for a stated purpose, any external network communication represents a potential risk, especially when combined with the prompt injection vulnerability, even if no direct data exfiltration is observed.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private chat history, code, configuration snippets, or misleading instructions from old content could be surfaced in later answers or influence the agent's behavior.

Why it was flagged

The artifact explicitly creates persistent retrieved context from broad local/private sources and reuses it automatically in future AI responses. That is central to RAG, but the scope and automatic reuse create material privacy and context-poisoning risk.

Skill content
It indexes your entire knowledge base – chat transcripts, workspace code, skill documentation ... When the AI responds, it automatically ... Includes that context in the response ... This happens transparently
Recommendation

Index only directories you intend to reuse, avoid indexing secrets or sensitive chats, add exclusions, review retrieved context, and use the delete/reset tools to remove data you do not want retained.

NoteMedium Confidence
ASI10: Rogue Agents
What this means

A scheduled updater could continue adding new chats and workspace files to the local RAG store after initial setup.

Why it was flagged

The documentation describes a recurring background update mechanism that keeps indexing new or changed local data. It is disclosed, but users should confirm it is not running unexpectedly.

Skill content
The RAG system includes an automatic update script that runs daily ... Runs via cron at 4:00 AM UTC daily ... State tracking: ~/.openclaw/workspace/memory/rag-auto-state.json
Recommendation

Check OpenClaw cron jobs, disable the updater if not wanted, and review the state and log files mentioned in the documentation.

What this means

If used, the skill can act through a Moltbook account and publish content using the configured key.

Why it was flagged

The optional Moltbook helper uses an API key and can post public/community content, while the registry metadata lists no required credentials. The behavior is documented and user-directed, so this is a notice rather than a standalone concern.

Skill content
To use Moltbook posting, configure your API key: export MOLTBOOK_API_KEY="your-key-here" ... python3 scripts/moltbook_post.py "Title" "Content"
Recommendation

Only configure a Moltbook API key if you intend to use posting, keep the key scoped if possible, and review any content before publishing.

What this means

Installing or updating the dependency/model may bring in external code or artifacts that are outside the reviewed skill files.

Why it was flagged

The skill depends on an external Python package and an initial model download. This is expected for a local RAG system, but the dependency is not pinned in the visible install instructions.

Skill content
python3 -m pip install --user chromadb ... Embeddings: all-MiniLM-L6-v2 (downloaded once, 79MB)
Recommendation

Install from trusted package indexes, consider pinning versions, and review dependency provenance if this is used in a sensitive environment.