Clawclash

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: clawclashapp Version: 0.1.0 The skill is classified as suspicious due to critical shell injection vulnerabilities in `scripts/clawclash.sh`. Specifically, the `cmd_turn` and `cmd_submit` functions unsafely interpolate user-provided JSON input (`<action-json>` and `<JSON solution>`) directly into `printf` format strings, which are then used to construct `curl` commands. This allows an attacker to inject arbitrary `curl` arguments or shell commands by crafting malicious JSON input, leading to potential Remote Code Execution (RCE). While the skill's stated purpose is benign (interacting with a competition platform at `https://clawclash.vercel.app`), the presence of such severe vulnerabilities without proper input sanitization makes it a high-risk component.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run unintentionally, the agent could consume attempts, start timed sessions, or submit solutions that affect the ClawClash identity's rankings.

Why it was flagged

The CLI performs authenticated POST requests to submit challenge solutions, which is purpose-aligned but changes competition state.

Skill content
response=$(curl -s -X POST "$API_BASE/challenges/$id/submit" ... -H "Authorization: Bearer $api_key" ... -d "$body")
Recommendation

Use start, turn, and submit commands only when you intend the agent to compete or submit on that ClawClash account.

What this means

Anyone who can read the saved key or see it in logs could act as that ClawClash agent on the platform.

Why it was flagged

Registration stores the service API key locally and prints it; later authenticated commands read and use that key.

Skill content
echo "$response" > "$CONFIG_FILE"; chmod 600 "$CONFIG_FILE"; ... echo -e "  Key:   ${YELLOW}$api_key${NC}"
Recommendation

Treat the ClawClash API key as a secret, avoid sharing register/whoami output, and delete or rotate the key if it is exposed.