OpenAI Codex Multi OAuth

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill matches its OAuth-debugging purpose, but it needs review because its scripts read OpenClaw OAuth/session files and use stored Codex tokens to query account usage while the registry metadata does not declare that sensitive access.

Install or run this only if you intentionally want help debugging OpenAI Codex OAuth profiles in OpenClaw. Prefer running the scripts manually, limit checks with --profile or a specific --state-dir when possible, avoid --raw unless necessary, and redact diagnostic output before sharing it. Back up any OpenClaw files before applying patches.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running the usage script lets the agent use existing Codex OAuth credentials to retrieve usage and account identifiers for one or more profiles. This is not evidence of token theft, but it is sensitive account access.

Why it was flagged

The usage report reads stored Codex access tokens and account IDs, then authenticates to the ChatGPT usage endpoint. This is expected for per-profile usage debugging, but it is high-impact account credential use and is not reflected by the registry metadata's lack of credential/config declarations.

Skill content
USAGE_URL = 'https://chatgpt.com/backend-api/wham/usage' ... 'Authorization': f'Bearer {token}' ... headers['ChatGPT-Account-Id'] = item['accountId']
Recommendation

Run this only for explicit Codex-profile debugging, prefer --profile to limit the accounts checked, and avoid sharing JSON/raw output publicly. The skill metadata should declare its local auth/profile/session access.

What this means

Diagnostic output may reveal profile IDs, emails, account IDs, workspace labels, session targets, and which OAuth profile a chat is pinned to.

Why it was flagged

The summary script reads persistent OpenClaw auth and session state and can print session targets and selected auth profile overrides. That is useful for debugging but may expose private local context.

Skill content
'auth': state_dir / 'agents' / agent / 'agent' / 'auth-profiles.json',
'sessions': state_dir / 'agents' / agent / 'sessions' / 'sessions.json' ... 'target': ... 'authProfileOverride': entry.get('authProfileOverride')
Recommendation

Treat script output as sensitive. Redact account, email, workspace, and session details before posting logs or asking others for help.

What this means

A mistaken patch could affect profile selection, status display, or usage reporting across chats.

Why it was flagged

The documentation includes guidance to patch runtime behavior or helper-side session syncing. This is consistent with a debugging/repair skill and includes backup guidance, but it can still alter local OpenClaw behavior if followed.

Skill content
patch the runtime usage path so it can prefer the intended session-selected profile ... Before any runtime patch:
- back up the file you change
- keep the patch minimal
Recommendation

Only patch files after confirming the affected layer, make backups first, and test one scenario at a time as the skill recommends.

What this means

Users may not realize from the registry fields alone that the skill runs local Python diagnostics against OpenClaw state files.

Why it was flagged

The registry metadata does not declare the Python runtime expectation or the local OpenClaw auth/session/config paths used by the included helper scripts. This is a metadata/provenance gap rather than evidence of hidden installation or malicious code.

Skill content
No install spec — this is an instruction-only skill ... Required binaries: none ... Primary credential: none ... Required config paths: none ... Code file presence: 2 code file(s)
Recommendation

The publisher should declare Python/script usage and the relevant ~/.openclaw paths or capability tags so users can understand the access before installing.