Powershell Sandbox

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill claims to safely sandbox PowerShell, but the actual sandbox implementation is missing and its safety/test claims are not supported by the provided artifacts.

Do not use this as a sandbox for untrusted PowerShell unless the missing src/sandbox.ps1 file and meaningful tests are provided and reviewed. If you experiment, only run trusted scripts, require explicit approval for execution, prefer a VM or OS sandbox, and check what is written to .learnings/sandbox-log.md.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users may believe they are installing a sandbox, but the artifact set does not include the code that would provide the advertised protections.

Why it was flagged

The documentation identifies src/sandbox.ps1 as the core sandbox executor, but the provided file manifest contains only package.json, SKILL.md, test/sandbox.test.js, and TEST_RESULTS.md. The core enforcement code is absent.

Skill content
src/\n│   ├── sandbox.ps1          # 沙箱执行器(核心)
Recommendation

Do not rely on this skill for untrusted PowerShell scripts until the missing sandbox implementation and real tests are supplied and reviewed.

What this means

If an agent or user treats this as a verified sandbox, untrusted PowerShell could be run with insufficient containment.

Why it was flagged

The skill tells the agent to invoke a local PowerShell script through exec. Local script execution is high-impact, and the sandbox file meant to constrain it is missing from the artifacts.

Skill content
exec(\n  command: '.\\skills\\powershell-sandbox\\src\\sandbox.ps1 -ScriptPath "C:\\Users\\99236\\.openclaw\\workspace\\scripts\\user-script.ps1"',\n  timeout: 60\n)
Recommendation

Require explicit user approval before any PowerShell execution, run only trusted scripts, and use a real OS-level sandbox or VM until the implementation is available.

What this means

The wording could cause users to over-trust the skill for running untrusted scripts.

Why it was flagged

The test results make strong safety claims even though the supplied artifacts lack the core sandbox implementation, and the included JS test can pass while reporting that the sandbox script is not found.

Skill content
Status: ✅ ALL TESTS PASSED ... Recommendations\n\n1. ✅ Ready for production use ... 2. ✅ Safe for untrusted scripts
Recommendation

Treat the production and safety claims as unverified unless backed by the actual sandbox source and tests that exercise the real controls.

What this means

Script activity may be stored locally and could later be read or reused by the agent environment.

Why it was flagged

The documentation says executions should be logged to a persistent .learnings file, which may retain script paths, commands, outputs, or other sensitive details.

Skill content
审计所有执行 - 记录到 `.learnings/sandbox-log.md`
Recommendation

Avoid running scripts containing secrets, and define clear retention, redaction, and review rules for the audit log.