Alex Session Wrap-Up

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: alex-session-wrap-up Version: 1.0.0 The skill is classified as suspicious due to a significant vulnerability in `scripts/session-wrap-up.sh`. The script explicitly adds and commits `*.env` files to the local Git repository and then pushes them to the remote origin. If these `.env` files contain sensitive API keys or credentials (which is highly probable, given the script loads them for LLM access) and the user's repository is public or becomes compromised, this action could lead to severe credential exposure. While this is a vulnerability rather than direct malicious intent to exfiltrate data to an unauthorized party, it poses a critical security risk.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Private changes or secrets in .env files could be committed and pushed to a remote repository unintentionally.

Why it was flagged

When invoked, the script automatically stages, commits, and pushes selected workspace files, explicitly including *.env, without showing a diff or requiring user confirmation.

Skill content
git add *.md *.txt *.json *.sh *.yaml *.yml *.env ... git commit -m "Auto-wrap-up: $(date -Iseconds)" ... git push origin HEAD
Recommendation

Remove *.env from the add list, require an explicit user approval step after showing git status/diff, and make pushing opt-in rather than automatic.

What this means

The skill may use credentials from the local OpenClaw environment in ways users would not expect from the metadata, and those same .env files are also candidates for git staging in the script.

Why it was flagged

The script loads the local .env file and uses provider API keys, while the registry metadata declares no required env vars or primary credential. The code does not limit loading to only the keys it needs.

Skill content
source "$WORKSPACE/../.env" ... -H "Authorization: Bearer $OPENAI_API_KEY" ... -H "Authorization: Bearer $OPENROUTER_API_KEY"
Recommendation

Declare the OpenAI/OpenRouter credentials in metadata, read only the specific variables needed, and avoid sourcing or staging broad .env files.

What this means

If the .env file contains unexpected commands or is tampered with, running the wrap-up script could execute those commands locally.

Why it was flagged

Using shell source on a .env file executes any shell syntax present in that file, rather than safely parsing only key-value assignments.

Skill content
if [[ -f "$WORKSPACE/../.env" ]]; then
  set -a
  source "$WORKSPACE/../.env"
  set +a
fi
Recommendation

Replace shell sourcing with safe parsing of specific variables such as OPENAI_API_KEY and OPENROUTER_API_KEY.

What this means

Memory entries may contain private session details, and model-generated text saved to memory could influence later work if future sessions trust that memory.

Why it was flagged

The script reads recent memory entries, sends them to an external model provider when an API key exists, and appends the model response back into the memory file.

Skill content
LEARNINGS=$(grep -E '^- ' "$MEMORY_FILE" ... | head -20 || true) ... curl ... "https://api.openai.com/v1/chat/completions" ... echo "$PATTERN_RESULT" >> "$MEMORY_FILE"
Recommendation

Review what is stored in memory before running, avoid including secrets in memory entries, and consider requiring confirmation before saving model-generated patterns.