OpenClaw Ops Guardrails

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If followed on the wrong gateway or node, a device or command runner could gain broad ongoing access without normal approval prompts.

Why it was flagged

These instructions can lower approval requirements to full/no-prompt mode and approve a device without clearly requiring identity verification, scoping, expiry, or rollback.

Skill content
需要无审批放行时,设置:`security=full, ask=off, askFallback=full` ... `openclaw devices approve --latest`
Recommendation

Require explicit administrator confirmation before these steps, verify the exact node/device identity, scope any approval bypass to a short maintenance window, and document how to restore approval settings afterward.

What this means

The agent may run small commands on a selected node during troubleshooting.

Why it was flagged

The skill explicitly uses remote command execution as a validation step. This is disclosed and aligned with operations troubleshooting, but it still acts on target devices.

Skill content
目标设备执行一条最小命令(echo/date/whoami)
Recommendation

Use it only on intended nodes and require confirmation before running anything beyond harmless validation commands.

What this means

An active tunnel or related process could be stopped during troubleshooting.

Why it was flagged

The playbook may terminate an existing tunnel process. This is a normal remediation for port conflicts, but can disrupt active sessions if the PID is wrong.

Skill content
复用已有 tunnel 或 kill 旧隧道 PID
Recommendation

Confirm the `lsof` result and the process owner before killing any PID.