OpenClaw 沙盒测试系统

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is broadly aligned with OpenClaw sandbox testing, but it overstates safety while providing scripts that can restart production OpenClaw and leave a background gateway running.

Review the shell scripts before running them. Treat apply-config.sh as a production-impacting script, not a zero-risk sandbox action. Make your own backup, validate after every manual edit, know how to stop the background sandbox Gateway, and be cautious of the hard-coded /Users/wh1ko HOME path on non-author systems.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A bad manual edit could be applied to production and restart OpenClaw into a broken state despite the skill advertising safe configuration changes.

Why it was flagged

The script validates before the user is told to manually modify the production config, then restarts the production Gateway without a post-edit validation or automatic rollback check.

Skill content
validate_config
apply_config
restart_gateway
...
echo -e "${YELLOW}提示:请手动修改配置文件${NC}"
read
...
openclaw gateway restart
Recommendation

Re-validate after the final config edit and before restart, add a trap-based rollback path, and make the user explicitly confirm the exact production file being changed.

What this means

Users may trust the skill more than warranted and run high-impact configuration scripts without reviewing their effects.

Why it was flagged

The documentation makes strong zero-risk and SAFE claims, but the provided scripts can change production configuration workflows, restart the Gateway, and start a persistent background service.

Skill content
**为 OpenClaw 配置变更提供零风险沙盒测试环境**

**安全评级**: 🟢 SAFE
Recommendation

Replace absolute safety claims with precise, bounded statements about what is backed up, what is isolated, what still affects production, and what the user must verify.

What this means

The sandbox service may remain running, consume resources, or conflict with later tests if the user forgets to stop it.

Why it was flagged

The sandbox starts a background OpenClaw Gateway that continues after the script exits. This is disclosed and purpose-aligned, but it is persistent local behavior.

Skill content
nohup openclaw gateway run --bind loopback --port 18800 \
  > $SANDBOX_DIR/.openclaw/logs/gateway.log 2>&1 &

echo $! > $SANDBOX_DIR/.openclaw/gateway.pid
Recommendation

Provide a clear stop command or cleanup script that uses the recorded PID and documents when the background Gateway remains active.

What this means

On other systems, environment cleanup could point OpenClaw or shell commands at the wrong home directory, causing configuration confusion or file writes in an unexpected location.

Why it was flagged

The cleanup script resets HOME to a hard-coded author path instead of the current user's real home directory, which is not portable and could misdirect later commands if sourced or adapted.

Skill content
if [ "$HOME" != "/Users/wh1ko" ]; then
    export HOME="/Users/wh1ko"
    echo -e "${GREEN}✓ HOME 已恢复${NC}"
fi
Recommendation

Remove the hard-coded path and restore HOME from a saved original value or avoid changing HOME in cleanup guidance.

What this means

Installation may appear dependency-free, but the scripts will fail or behave differently unless those local tools are available.

Why it was flagged

The script depends on Git and OpenClaw, while the registry metadata declares no required binaries. This is likely a metadata gap rather than hidden behavior.

Skill content
if ! command -v git &> /dev/null; then
...
if ! command -v openclaw &> /dev/null; then
Recommendation

Declare git and openclaw as required binaries or clearly document them as prerequisites in the registry metadata.