Moltguard 6.8.16
Analysis
Review before installing: this security skill is coherent in purpose, but it asks the agent to install an external plugin, create/store API credentials, and use an external Core service for sensitive security checks.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
When the human asks to install MoltGuard, or when you want to protect yourself: ... openclaw plugins install @openguardrails/moltguard
This gives the agent discretion to modify the OpenClaw plugin environment, not only after explicit user approval. Installing a plugin changes the agent's behavior and authority.
openclaw plugins install @openguardrails/moltguard
The reviewed artifact is instruction-only, while the real guard is installed from an external, unpinned package command. That means the installed code may differ from the reviewed SKILL.md artifact.
Tell the user: "I just tested MoltGuard ... MoltGuard detected it! Your security protection is now active."
The instruction scripts a successful security claim after reading a sample file, without requiring the agent to check an actual detection result or status output.
This removes MoltGuard config from `openclaw.json`, plugin files, and credentials. Restart OpenClaw to apply.
The uninstall text shows the plugin persists through OpenClaw config, plugin files, and stored credentials until removed. That persistence is expected for a security guard, but users should notice it.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Shows your API key ... Shows your Agent ID and API Key ... Credentials saved to `~/.openclaw/credentials/moltguard/`
The skill manages MoltGuard/Core credentials and may display API keys to the user. This is expected for account linking, but the keys are sensitive.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
All security detection is performed by Core: ... Data Risk — Secret leakage, PII exposure, sending sensitive data to LLMs
The artifact says an external Core service performs detections involving sensitive data risks, but it does not define what content is sent, retention, redaction, access controls, or approval boundaries.
