OpenClaw Guard
Analysis
The guard mostly matches its backup-and-rollback purpose, but it ships with an active script config that points backups to a personal-looking path and enables Feishu messages to a hard-coded recipient.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
backup_dir: /home/ljj/.openclaw/backups ... feishu_enabled: true feishu_open_id: ou_0b05bbfa08fd31bb887ba0fc4dcf6854
The shipped config under the script directory contains a personal-looking absolute backup path and enables Feishu notifications to a fixed Open ID. This conflicts with the user-facing presentation of a generic guard with optional alerting.
守护脚本 (独立进程) ... 时间到,直接回滚! cp 备份 → 配置 systemctl restart
The documented design is an independent guard process that continues after start and performs rollback plus Gateway restart if not stopped. This is the stated safety mechanism, but it is persistent and high-impact.
cp "$file" "$target"
...
if systemctl --user restart "$GATEWAY_SERVICE" 2>/dev/null; then
log_success "Gateway 重启完成"
elif openclaw gateway start 2>/dev/null; thenThe script performs file overwrites and service control. These actions are expected for rollback, but they are high-impact local operations.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
openclaw message send \
--channel feishu \
--target "$FEISHU_OPEN_ID"The script uses the local OpenClaw messaging capability to send to a configured Feishu target. With the provided hard-coded target, this may use the user's account or integration authority in a way they did not choose.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
openclaw message send \
--channel feishu \
--target "$FEISHU_OPEN_ID" \
--message "$message" 2>/dev/nullThe script can send operational messages through Feishu. Combined with the shipped script config enabling Feishu and hard-coding a target, this creates an external communication path with unclear user ownership and data boundaries.
BACKUP_FILES=(
"$HOME/.openclaw/openclaw.json"
"$WORKSPACE_DIR/AGENTS.md"
"$WORKSPACE_DIR/SOUL.md"
"$WORKSPACE_DIR/USER.md"
"$WORKSPACE_DIR/MEMORY.md"
"$WORKSPACE_DIR/TOOLS.md"
)The skill intentionally backs up and restores persistent agent instruction, user, memory, and tool files. This is aligned with rollback, but these files can contain sensitive or behavior-shaping context.
