honcho

clawhub:honcho

View source
B
84/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

3

Score

84/100

MEDIUM 2
LOW 1

Findings (3)

MEDIUM
Section claims authority and urgency with dangerous instructions
L2

Section claims authority and urgency with dangerous instructions

name: honcho-setup
description: >
Install the @honcho-ai/openclaw-honcho plugin and migrate legacy file-based
memory to Honcho. UPLOADS WORKSPACE CONTENT TO EXTERNAL API: Sends
USER.md, MEMORY.md, IDE...
FIX

Remove false authority claims (e.g., claiming administrator or root-level access) from tool descriptions. Tool descriptions should describe capabilities, not claim elevated roles.

FP?

Likely FP if the matched text is documentation explaining role-based access control concepts or describing user personas, not impersonating a system role.

MEDIUM
Cross-tool data leakage
L96

Detects patterns where credential or secret reads are combined with external data transmission

read ONLY the `HONCHO_API_KEY + Upload
- **What is uploaded**: Content
FIX

Prevent credentials and sensitive data obtained by one MCP tool from being passed to other tools. Implement data isolation between tools and restrict cross-tool data flow for secrets.

FP?

Likely FP if the cross-tool data flow is intentional API authentication (e.g., a tool fetches an auth token that another tool uses for the same service).

LOW
Runtime URL controlling behavior
L100

Detects URLs fetched at runtime that control or influence agent behavior without pinning

get a key at https:// + template
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.