Openclaw Zh
Analysis
This skill appears to do what it claims—translate OpenClaw UI files—but it works by directly modifying the local OpenClaw installation, so users should run it intentionally.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
OPENCLAW_ROOT = Path("/usr/lib/node_modules/openclaw") ... with open(js_file, 'w', encoding='utf-8') as f: f.write(content)The helper script directly edits the installed OpenClaw Control UI JavaScript bundle. This matches the translation purpose and includes backup/restore logic, but users should understand it mutates the local installation.
python3 ~/.openclaw/workspace/skills/openclaw-zh/scripts/apply_translation.py
The skill is described as instruction-only with no required binaries declared, but its main workflow depends on running a bundled Python script. This is purpose-aligned, but the local tool requirement is under-declared.
`translations/chrome-extension-zh.json` - Chrome 扩展中文翻译映射
The SKILL.md references a Chrome extension JSON translation file, while the manifest provides translations/chrome-extension-zh.html. This is a packaging/documentation inconsistency rather than evidence of malicious behavior.
