Back to skill
Skillv0.2.6
ClawScan security
Arpc · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 26, 2026, 4:34 AM
- Verdict
- suspicious
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's stated purpose (agent messaging/ARP) is plausible, but the runtime instructions perform sensitive actions (curl|bash install from a third-party domain, read OpenClaw gateway tokens and session keys, modify systemd config and write plaintext tokens) that are not declared in the metadata — review the installer and token-handling steps before installing.
- Guidance
- This skill appears to do what it says (agent messaging and an optional OpenClaw bridge) but the runtime steps do sensitive things you should not accept blindly. Before installing: - Do NOT run curl | bash on https://arp.offgrid.ing without reviewing the script. Ask for the installer’s source or a reproducible release (git tag/GitHub release or signed binary) and a checksum. - The bridge requires your OpenClaw gateway token and session key. The skill’s instructions locate these in local config files and session files and will store the token in ~/.config/arpc/config.toml (plain text). Only proceed if you trust the arpc authors and understand that anyone with that token can act on your OpenClaw gateway. - The skill metadata did not declare these env vars/config paths — treat that as a red flag. Ask the publisher to declare required credentials/config paths and to explain why each is needed. - If you must try it, run the installer in a controlled environment (VM/container) first, inspect the installer script and the arpc binary, and avoid reusing sensitive tokens. Prefer manual install from audited releases and rotate your OpenClaw gateway token after testing. - If you administer a multi-user system, be cautious: the installer may attempt systemd/launchd changes requiring elevated privileges.
Review Dimensions
- Purpose & Capability
- concernThe skill's purpose (agent-to-agent messaging and an OpenClaw bridge) reasonably explains needing the arpc binary, the relay URL, and access to an OpenClaw gateway token/session key. However, the registry metadata declares no required env vars or config paths while the instructions explicitly read OPENCLAW_GATEWAY_TOKEN and multiple OpenClaw config/session files (~/.openclaw, ~/.clawdbot). This mismatch (undeclared sensitive inputs) is an incoherence and should be justified or fixed.
- Instruction Scope
- concernSKILL.md instructs the agent to: run an installer via curl | bash from https://arp.offgrid.ing, search multiple local config files for the OpenClaw gateway token, extract session keys from session files (~/.openclaw/agents/.../*.jsonl), write plaintext tokens to ~/.config/arpc/config.toml, and optionally alter systemd/launchd service files. Those actions access and persist sensitive credentials and modify system service configuration — they go beyond merely 'calling arpc' and must be explicitly declared and audited.
- Install Mechanism
- concernThere is no formal install spec in the registry. The instructions tell users to run curl -fsSL https://arp.offgrid.ing/install.sh | bash which downloads and executes a script from a non-standard domain (not a well-known, transparently-hosted release like GitHub releases). Piping a remote script to a shell is high risk; the skill provides no checksum, provenance, or content of the installer to verify.
- Credentials
- concernRegistry metadata lists no required env vars or config paths, yet the instructions explicitly read OPENCLAW_GATEWAY_TOKEN (env) and multiple OpenClaw config files to extract a gateway token and session key. These variables/paths are sensitive (auth token, session identifiers) and should have been declared as required. The skill will persist the token in plaintext config (~/.config/arpc/config.toml) per its own notes.
- Persistence & Privilege
- noteThe skill does not request 'always:true' and is not inherently persistent. It does, however, instruct installing a daemon, writing config under ~/.config/arpc (including tokens), and potentially editing systemd service files. Writing its own config and starting a daemon is expected for a messaging service, but the instructions to modify systemd units and store gateway tokens in plaintext raise privilege and persistence considerations that should be reviewed.
