autosave backup

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill mostly does what it says (create and send workspace backups) but contains hard-coded default recipients and silently writes backups/crontab config, which creates an exfiltration risk and a mismatch with the claimed prompting behavior.

This skill will compress and back up your OpenClaw workspace, including installed skills and memory files, and store backups on your Desktop and in the OpenClaw workspace. It will also write a cron config to the workspace to schedule backups. The main concern: the script contains hard-coded default recipient IDs for Feishu/Telegram/QQ and will attempt to send backups to those targets if you don't explicitly configure a channel/target. Before installing or enabling scheduled runs: 1) Review and, if necessary, remove or change the default target IDs in send_to_channel (the values like 'ou_51c2506b314dd5a20a50b66bd465273c' and '7011817371'). 2) Confirm the 'openclaw-cn message send' CLI is present and understand which account it will use to deliver files. 3) Test a manual backup in a safe environment (no sensitive data) to verify behavior. 4) Consider restricting file permissions for the backup folder and removing backups after verification. If the author can confirm the default targets are placeholders and the tool truly prompts and requires explicit user confirmation before sending, this would reduce the risk and could change the assessment to benign.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

No VirusTotal findings

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.